Abstract
This chapter presents an asymmetric approach to cryptography - it uses different keys for encryption and decryption. The key for encryption is announced publically so that everybody can encode a message. Only the owner of the matching secret key can decode the encrypted message. Most cryptographic schemes used today in the Internet are based on asymmetric algorithms using a secret and a public key. © 2011 Springer-Verlag Berlin Heidelberg.
Cite
CITATION STYLE
APA
Bongartz, D., & Unger, W. (2011). Public-key cryptography. In Algorithms Unplugged (pp. 147–158). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-15328-0_16
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.
Already have an account? Sign in
Sign up for free