We can trade security for speed by
(a) decreasing ‘c’ and increasing ‘r’
(b) increasing ‘c’ and decreasing ‘r’
(c) decreasing both ‘c’ and ‘r’
(d) increasing both ‘c’ and ‘r’
The question was posed to me in an interview.
My question is based upon Secure Hash Algorithms (SHA) topic in portion Other Public Key Cryptosystems and Cryptographic Hash Functions of Cryptograph & Network Security