Back to Results
First PageMeta Content
Block cipher / Public-key cryptography / CMAC / Poly1305-AES / Cryptography / Message authentication codes / Cryptographic hash function


2006 Paper 4 Question 10 Introduction to Security (a) Alice and Bob participate in a public-key infrastructure that enables them to exchange legally binding digital signatures. (i ) Name two reasons why, for some purpos
Add to Reading List

Document Date: 2013-09-26 09:50:43


Open Document

File Size: 98,87 KB

Share Result on Facebook
UPDATE