Public-key cryptography

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter presents an asymmetric approach to cryptography - it uses different keys for encryption and decryption. The key for encryption is announced publically so that everybody can encode a message. Only the owner of the matching secret key can decode the encrypted message. Most cryptographic schemes used today in the Internet are based on asymmetric algorithms using a secret and a public key. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Bongartz, D., & Unger, W. (2011). Public-key cryptography. In Algorithms Unplugged (pp. 147–158). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-15328-0_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free