… The algorithm's name, RSA, is the initials of each of their surnames … I cover some different cryptography primitives that you can use to help enforce data integrity, including hashing algorithms such as MD5, and Secure Hash Algorithms, such as SHA-1, SHA-256, and SHA …
CITATION STYLE
Haunts, S. (2019). A Brief History of Cryptography. In Applied Cryptography in .NET and Azure Key Vault (pp. 11–23). Apress. https://doi.org/10.1007/978-1-4842-4375-6_2
Mendeley helps you to discover research relevant for your work.