Smart, Nigel P. (contributor); Tirtea, Rodica (contributor) - 2014 - November, 2014
Cryptographic algorithms, when used in networks, are used within a cryptographic protocol. In the ENISA algorithms report of 2013 [113], several protocols were discussed. In this document (which is the sister document of the 2014 report [115]) we extend the work in the 2013 report to cover more...