GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

RSA-OAEP is a public-key encryption scheme based on RSA and…

RSA-OAEP is a public-key encryption scheme based on RSA and the Optimal Asymmetric Encryption Padding (OAEP) method

Read Details

Early in the year, Scott buys an American call option on 100…

Early in the year, Scott buys an American call option on 100 shares of Exxon-Mobil common stock with a June expiration and a strike price of $20 per share. He pays a premium of $10.10. Exxon-Mobil common stock currently is trading for $27.05 per share. Assume that today is now the expiration date for the contract. What is the lowest price on Exxon-Mobil common stock at which Scott would exercise his call option? Assume the price increment at which the common stock trades is a penny, i.e., $0.01. Ignore brokerage fees.

Read Details

Suppose that today is early January. Let’s consider one Amer…

Suppose that today is early January. Let’s consider one American call option contract, with an April expiration month, on 100 shares of Intel common stock at a strike price of $60.00 per share. Suppose that Intel common stock currently is trading for $57.32 per share in the Nasdaq Stock Market. Today, Byron buys one contract from Selena, the option writer, for a premium of $1.95 per share. Why would Byron buy a call option contract that gives him the right to buy Intel at $60.00 per share when the stock currently is priced at the lower price of $57.32 in the stock market? (Choose the best answer.)

Read Details

Which of the following is/are true about the Diffie-Hellman…

Which of the following is/are true about the Diffie-Hellman key exchange protocol? (Select all that apply.)

Read Details

Diffie-Hellman protocol can be used as a building block for…

Diffie-Hellman protocol can be used as a building block for efficient group key establishment.

Read Details

In hash functions, collision resistant means that we cannot…

In hash functions, collision resistant means that we cannot find any two different bitstrings so that they are mapped to the same hash value by using a hash function.

Read Details

What is/are NOT true about side-channel attacks? (Select all…

What is/are NOT true about side-channel attacks? (Select all that apply.)

Read Details

Caesar cipher is less secure than Vigenere cipher.

Caesar cipher is less secure than Vigenere cipher.

Read Details

Kerckhoffs’ principle, named after Ron Rivest, Adi Shamir an…

Kerckhoffs’ principle, named after Ron Rivest, Adi Shamir and Auguste Kerckhoffs, is widely accepted in the cryptographic research community.

Read Details

When passing from the theoretical description of a cryptogra…

When passing from the theoretical description of a cryptographic algorithm to its implementation, serious security weaknesses can be introduced even if the correct outputs of the algorithm are produced.

Read Details

Posts pagination

Newer posts 1 … 45,701 45,702 45,703 45,704 45,705 … 69,123 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top