2. Public key cryptography
2.1 Certification techniques
Cryptographic techniques are used to ensure trust in dematerialized exchanges and, in particular, commerce (in the broadest sense) on the Internet. Among these, public key cryptography is essential. Here are just a few of the techniques used
data encryption and decryption using secret and/or public key techniques;
the technique for creating condensed information using hash operations;...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Public key cryptography
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
References
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!