Abstract
Before we learn about the basics of public-key cryptography, let us recall that the term public-key cryptography is used interchangeably with asymmetric cryptography; they both denote exactly the same thing and are used synonymously.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Paar, C., Pelzl, J. (2010). Introduction to Public-Key Cryptography. In: Understanding Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04101-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-04101-3_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-44649-8
Online ISBN: 978-3-642-04101-3
eBook Packages: Computer ScienceComputer Science (R0)