Ch11
Public Key ECC, Hash. Elliptic Curve Cryptography majority of public-key crypto (RSA, D-H) use either integer or polynomial arithmetic with very large.
Cryptography and Network Security Chapter 11
CSCE 815 Network Security Lecture 8 SHA Operation and Kerberos.