Security Engineering
A Guide to building dependable distributed systems
Chapter 5 CryprographyBy Ross Anderson· 2020Link to book
The time limit has expired and your responses have been submitted.