Just the signature algorithm. Hashing isn't nearly as vulnerable as elliptic curve cryptography.
Login to reply
Replies (1)
ha thank you for the explanation and what you do i appreciate it