Cryptography: Difference between revisions

From Wiki
(Create page stub)
(No difference)

Revision as of 17:11, 18 August 2020

  • SHA3 algorithms are currently considered invulnerable to length-extension attacks.
  • Message Authentication Codes (MAC) are like a symmetric key cryptography version of digital signatures.