1 Crore+ students have signed up on EduRev. Have you? Download the App |
Which one of the following algorithm is not used in asymmetric-key cryptography?
In cryptography, the order of the letters in a message is rearranged by
Which one of the following is a cryptographic protocol used to secure HTTP connection?
Voice privacy in GSM cellular telephone protocol is provided by
Cryptographic hash function takes an arbitrary block of data and returns
21 videos|113 docs|66 tests
|
21 videos|113 docs|66 tests
|