Loading...
Lenstra’s method is an effective subexponential algorithm with applications in this field and involves computing points on an elliptic curve over a finite field. Diffie and Hellman name a protocol in this field that is used to perform “exchanges” over a channel. This field relies on “hardness” assumptions such as the discrete logarithm problem. So-called “primitives” like the hash SHA-1 are used as the basis for systems in this field. A public key and a private key are used in an algorithm in this field that relies on the difficulty of factoring large numbers, the RSA algorithm. For 10 points, name this branch of computer science that develops secure communication methods. ■END■
2024 ACF Fall at Cornell | fall | Y | 10 | 100% | 0% | 20% | 69.10 |
2024 ACF Fall at Ohio State | fall | Y | 8 | 100% | 0% | 0% | 55.13 |
2024 ACF Fall at Washington | fall | Y | 1 | 100% | 0% | 0% | 23.00 |
2024 ACF Fall at Georgia | fall | Y | 12 | 100% | 0% | 0% | 66.08 |
2024 ACF Fall at North Carolina | fall | Y | 9 | 100% | 0% | 11% | 76.11 |
2024 ACF Fall at Claremont Colleges | fall | Y | 5 | 100% | 0% | 0% | 44.80 |
2024 ACF Fall at Rutgers | fall | Y | 8 | 100% | 0% | 0% | 47.75 |
2024 ACF Fall at Illinois | fall | Y | 9 | 100% | 0% | 11% | 59.44 |
Player | Team | Opponent | Buzz Position | Value |
---|---|---|---|---|
Parker McCoig | Tennessee A | Alabama A | 23 | 10 |
Daniel Chen | Emory Oxford | Tennessee B | 23 | 10 |
Jeffery Xu | Georgia Tech D | Vanderbilt A | 41 | 10 |
Aaron Taylor | Mississippi State A | Auburn C | 61 | 10 |
Ryon Peddapalli | Clemson B | Belmont | 67 | 10 |
Ishaan Kashyap | Georgia Tech C | Emory A | 76 | 10 |
Monish Jampala | Georgia Tech B | Clemson A | 78 | 10 |
Kabir Zaman | South Carolina A | Auburn A | 78 | 10 |
Kabir Zaman | South Carolina A | Auburn A | 78 | 10 |
John Mcqueen | South Carolina B | Vanderbilt B | 78 | 10 |
Rafeed Rahman Turjya | Georgia A | Furman | 83 | 10 |
TJ Pickering | Auburn B | Southern | 107 | 10 |