Applied Cryptography

1.AES

post-thumbnail

2.Properties of hash functions

post-thumbnail

3.SHA-2

post-thumbnail

4.symmetric encryption

post-thumbnail

5.asymmetric cryptography

post-thumbnail

6.Sponge function

post-thumbnail

7.XOF (SHAKE & cSHAKE)

post-thumbnail

8.MAC (Message Authentication Code)

post-thumbnail

9.HMAC (Hash-based Message Authentication Code)

post-thumbnail

10.Properties of Digital Signature

post-thumbnail

11.KMAC

post-thumbnail