Publickey encryption Symmetrickey encryption Invertible function Security depends

Sign up to view full document!
SIGN UP
  • Slides: 13
Download presentation