… 1: This is a 160-bit hash function which resembles the earlier MD5 algo- rithm … of variations such as ECC-DH (ECC Diffie-Hellman), and ECC-DSA (ECC Digital Signature Algorithm) … One of the most common applications for cryptographic algorithms, is in the security of wireless …
CITATION STYLE
Easttom, C. (2020). Information Assurance/Encryption. In The NICE Cyber Security Framework (pp. 1–30). Springer International Publishing. https://doi.org/10.1007/978-3-030-41987-5_1
Mendeley helps you to discover research relevant for your work.