What other stream ciphers are there?
At what point does an attack become practical ?
How is cryptography applied ?
What are elliptic curves ?
Which is easier, factoring or discrete log?
Can RSA be exported from the U.S.?
What is the secure hash algorithm (sha and sha-1)?
What are the prospects for a theoretical breakthrough in the discrete log problem ?
Explain the meaning of Cryptography.
Are elliptic curve cryptosystems secure ?
What is SHS?
How do elliptic curve cryptosystems compare with other cryptosystems ?
How is RSA used for authentication in practice?
What are LEAFs ?
What is the factoring problem ?