implement cryptographic constructs
Implement cryptographic constructs such as hash functions, symmetric-key algorithms, and asymmetric-key algorithms, in the context of specific applications.
Implement cryptographic constructs such as hash functions, symmetric-key algorithms, and asymmetric-key algorithms, in the context of specific applications.