Citations

Existing Citations

  • cryptography (p.567): The basic idea in cryptography is to apply a complex transformation to the information to be protected. (†2379)
  • public key cryptography (p.576): As the keys for encryption and decryption are different, and Alice and Bob have different information, public-key algorithms are also known as asymmetric algorithms. (†2380)