Birthday attacks are used against which of the following?()

A .  digital signatures B .  symmetric ciphering C .  hashalgoritms D .  asymmetric ciphering E .  digital certificate

时间:2022-10-25 01:52:17 所属题库:CCIE(350-018)题库

相似题目