Cryptography: Difference between revisions
From Wiki
(Create page stub) |
(No difference)
|
Revision as of 17:11, 18 August 2020
- SHA3 algorithms are currently considered invulnerable to length-extension attacks.
- Message Authentication Codes (MAC) are like a symmetric key cryptography version of digital signatures.