Public key cryptography

0Citations
Citations of this article
314Readers
Mendeley users who have this article in their library.

Abstract

In this chapter, the notion of public key cryptography is introduced. Then the RSA-scheme introduced by Rivest, Shamir, and Adleman is treated. The security of this scheme is based on factorization problems of integers. We also include illustrations of how another number theoretical problem, known as the discrete logarithm problem, is used and implemented in the public key cryptographic systems today.

Cite

CITATION STYLE

APA

Smalø, S. O. (2011). Public key cryptography. In A Multidisciplinary Introduction to Information Security (pp. 37–48). CRC Press. https://doi.org/10.2307/j.ctvz938zn.7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free