In cryptography,
1. The receiver can verify signature using public key
2.0 cryptographic hash function is used in creating digital fingerprint
3.0 Both 1 and 2
4.0 None of the above
Answers
Answered by
0
Answer:
yes
Explanation:
Similar questions
Chemistry,
2 months ago
English,
2 months ago
Social Sciences,
2 months ago
Math,
5 months ago
English,
1 year ago