Affordable Access

Mathematical Background of Public Key Cryptography

Publication Date
  • Computer Science
  • Mathematics


The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.

There are no comments yet on this publication. Be the first to share your thoughts.