Cryptography Authentication and Data Integrity Aims of Authentication Authentication with Symmetric Key Encryption Authentication with Hash Functions Authentication with MACs Digital Signatures
Authentication and Data Integrity
Cryptography
School of Engineering and Technology CQUniversity Australia
Prepared by Steven Gordon on 15 Apr 2020, auth.tex, r1850