Question
a.
2 real, 1 imaginary
b.
all real
c.
all imaginary
d.
2 imaginary, 1 real
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. How many real and imaginary roots does the equation y^2=x^3-4x have
Similar Questions
Discover Related MCQs
Q. In the elliptic curve group defined by y^2= x^3- 17x + 16 over real numbers, what is P + Q if P = (0,-4) and Q = (1, 0)?
View solution
Q. In the elliptic curve group defined by y^2= x^3- 17x + 16 over real numbers, what is 2P if P = (4, 3.464)?
View solution
Q. “Elliptic curve cryptography follows the associative property.”
View solution
Q. “In ECC, the inverse of point P =(x1, y1) is Q = (-x1, y1). “
View solution
Q. On adding the two points P (4,2) and Q (10, 6) in the elliptic curve E11(1,1) we get
View solution
Q. If P = (1,4) in the elliptic curve E13(1, 1) , then 4P is
View solution
Q. Multiply the point P=(8, 1) by a constant 3, thus find 3P, in the elliptic curve E13(1, 1)
View solution
Q. Bob selects E67(2, 3) as the elliptic curve over GF(p). He selects e1 = (2, 22) and d = 4. Then he calculates e2 = d × e1 .What is the value of e2?
View solution
Q. Bob selects E67(2, 3) as the elliptic curve over GF(p). He selects e1 = (2, 22) and d = 4. Then he calculates e2 = d × e1 and the publicly announces the tuple (E, e1, e2). Now, Alice wants to send the plaintext P = (24, 26) to Bob and she selects r = 2. What are C1 and C2?
View solution
Q. P = C1 – (d x C2)
Is this above stated formula true with respect to ECC?
View solution
Q. For the point P (11, 2) defined in the curve E13(1, 1). What is –P?
View solution
Q. For the point P (7, 0) defined in the curve E13(1, 1). What is –P?
View solution
Q. When a hash function is used to provide message authentication, the hash function value is referred to as
View solution
Q. Message authentication code is also known as
View solution
Q. The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.
View solution
Q. What is a one-way password file?
View solution
Q. Which one of the following is not an application hash functions?
View solution
Q. If the compression function is collision resistant, then so is the resultant iterated hash function.
View solution
Q. A larger hash code cannot be decomposed into independent subcodes.
View solution
Q. We define collision as: A collision occurs if we have x=y and H(x) = H(y).
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!