In cryptography,
1. The receiver can verify signature using public key
2.0 cryptographic hash function is used in creating digital fingerprint
3.0 Both 1 and 2
4.0 None of the above
Answers
Answered by
0
Answer:
yes
Explanation:
Similar questions
Math,
2 months ago
Environmental Sciences,
2 months ago
Science,
2 months ago
Math,
4 months ago
Math,
11 months ago
Social Sciences,
11 months ago
English,
11 months ago