Which is easier, factoring or discrete log?
No Answer is Posted For this Question
Be the First to Post Answer
What is safer?
What is identification ?
What is SSH ?
What is OAEP ?
How does the length of a hash value affect security?
What is privacy ?
How is RSA used for encryption in practice?
What is the GSS-API ?
What are interactive proofs and zero-knowledge proofs ?
What are the prospects for a theoretical breakthrough in the discrete log problem ?
How are certificates used?
Can we do the project in ENCRYPTION AND DECRYPTION as a operating system project? If yes how can we use the concepts?