asymmetric cryptography

Show Summary Details

Quick Reference

A collection of cryptographic methods which rely on more than one key. Almost certainly the best known of these is public key encryption. This requires the use of two keys: a public key and a private key.

Subjects: Computing.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.