Public-key cryptography

1Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The basic idea of public-key cryptography are public keys. Each person’s key is separated into two parts: a public key for encryption available to everyone and a secret key for decryption which is kept secret by the owner. In this chapter we introduce the concept of public-key cryptography. Then we discuss some of the most important examples of public-key cryptosystems, such as the RSA, ElGamal and Rabin cryptosystems. These all provide encryption and digital signatures.

Cite

CITATION STYLE

APA

Delfs, H., & Knebl, H. (2015). Public-key cryptography. In Information Security and Cryptography (Vol. 2, pp. 49–106). Springer International Publishing. https://doi.org/10.1007/978-3-662-47974-2_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free