Narayana Jayaram

Learn More
Encryption algorithms supply confidentiality to communications between parties. However, only under certain circumstances, encryption might also supply integrity validation. For those situations, where encryption algorithms do not supply any integrity protection, additional mechanisms must be implemented (hash functions, digital signature). In this way,(More)
  • 1