![subject](/tpl/images/cats/informatica.png)
Computers and Technology, 18.03.2020 05:43 NijaNij
Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties (such as nonrepudiation) which are not offered by secret key cryptography. So why do we still use symmetric cryptography in applications?
![ansver](/tpl/images/cats/User.png)
Answers: 2
![](/tpl/images/ask_question.png)
![](/tpl/images/ask_question_mob.png)
Other questions on the subject: Computers and Technology
![image](/tpl/images/cats/informatica.png)
Computers and Technology, 21.06.2019 16:00, carlosleblanc26
This statement accurately describes how headlines should be placed in business documents.
Answers: 3
![image](/tpl/images/cats/informatica.png)
![image](/tpl/images/cats/informatica.png)
![image](/tpl/images/cats/informatica.png)
Computers and Technology, 23.06.2019 15:20, headshotplayzcod
In a game with three frames, where will the objects on layer 1 appear? a. next to the play area b. in the middle of the game c. behind everything else d. in front of everything else
Answers: 1
You know the right answer?
Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furtherm...
Questions in other subjects:
![Konu](/tpl/images/cats/mat.png)
Mathematics, 18.11.2020 22:40
![Konu](/tpl/images/cats/mat.png)
![Konu](/tpl/images/cats/istoriya.png)
History, 18.11.2020 22:40
![Konu](/tpl/images/cats/istoriya.png)
![Konu](/tpl/images/cats/istoriya.png)
History, 18.11.2020 22:40
![Konu](/tpl/images/cats/mkx.png)
Arts, 18.11.2020 22:40
![Konu](/tpl/images/cats/mat.png)
Mathematics, 18.11.2020 22:40
![Konu](/tpl/images/cats/en.png)
English, 18.11.2020 22:40
![Konu](/tpl/images/cats/istoriya.png)