Just the signature algorithm. Hashing isn't nearly as vulnerable as elliptic curve cryptography.
ha thank you for the explanation and what you do i appreciate it
Please Login to reply.
No replies yet.