Narayana Jayaram

Learn More
Encryption algorithms supply confidentiality to communications between parties. However, only under certain circumstances , encryption might also supply integrity validation. For those situations, where encryption algorithms do not supply any integrity protection, additional mechanisms must be implemented (hash functions, digital signature). In this way,(More)
  • 1