[PDF][PDF] Tracing Cryptographic Agility in Android and iOS Apps.

K Heid, J Heider, M Ritscher, JP Stotz - 2023 - scitepress.org
Cryptography algorithms are applicable in many use cases such as for example encryption,
hashing, signing. Cryptography has been used since centuries, however some cryptography …

Tracing Cryptographic Agility in Android and iOS Apps

K Heid, J Heider, M Ritscher, JP Stotz - 2023 - publica.fraunhofer.de
Cryptography algorithms are applicable in many use cases such as for example encryption,
hashing, signing. Cryptography has been used since centuries, however some cryptography …