11. However, other cryptographic algorithms do not appear to be broken by those algorithms. 12. All cryptographic algorithms are in the crypto card. 13. GSM uses several cryptographic algorithms for security. 14. A third class of information theory codes are cryptographic algorithms ( both codes and ciphers ). 15. This one-way function behavior makes modular exponentiation a candidate for use in cryptographic algorithms . 16. The Encrypting File System supports Elliptic-curve cryptographic algorithms ( ECC ) in Windows 7. 17. It contains both the cryptographic algorithms as well as the key ( s ) used for encryption. 18. The cryptographic algorithms are implemented using third-party cryptographic libraries included internally in the Dropbear distribution. 19. For example, a cryptographic algorithm may be implemented by hardware and software that is widely distributed among users. 20. Using these cryptographic algorithms , the user s signature cannot be replicated without having access to their private key.