It includes symmetric key cryptography, asymmetric key cryptography, hash functions, message authentication codes, digital signatures, etc.
It includes symmetric key cryptography, asymmetric key cryptography, hash functions, message authentication codes, digital signatures, etc.