The main article for this category is Public-key cryptography.fa:رده:رمزنگاری با کلید نامتقارن fr:Catégorie:Algorithme de cryptographie asymétrique
“In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for...ElGamal encryption
“In cryptography, a Lamport signature or Lamport one-time signature scheme is a method for...Lamport signature
“The Secure Remote Password protocol (SRP) is a password-authenticated key agreement protocol...Secure Remote Password protocol
“The Goldreich-Goldwasser-Halevi (GGH) encryption scheme is an asymmetric key encryption...GGH encryption algorithm
“In cryptography, the Full Domain Hash (FDH) is an RSA-based signature scheme that follows the...Full Domain Hash
“Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the...Elliptic curve cryptography
“Patent-related uncertainty around elliptic curve cryptography (ECC), or ECC patents, is one of...ECC patents
Pages in category "Asymmetric-key cryptosystems"
The following 90 pages are in this category, out of 90 total.