“Hyperelliptic curve cryptography is similar to elliptic curve cryptography (ECC) insofar as the...Hyperelliptic curve cryptography
“In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for...ElGamal encryption
“Template:Unreferenced In cryptography, a trusted third party (TTP) is an entity which...Trusted third party
“In cryptography the Rabin Signature Scheme is a method of Digital signature originally proposed...Rabin signature algorithm
“In cryptography, signcryption is a public-key primitive that simultaneously performs the...Signcryption
“Template:About A digital signature or digital signature scheme is a mathematical scheme for...Digital signature
“The Rabin cryptosystem is an asymmetric cryptographic technique, whose security, like that of...Rabin cryptosystem
Pages in category "Public-key cryptography"
The following 24 pages are in this category, out of 24 total.