A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap

Information security has become a key concern for communication over public channels thus necessitating the use of cryptography to safeguard communication. In this paper, we present a comprehensive review of the asymmetric key algorithms, beginning from the inception of asymmetric cryptography in 19...

Full description

Saved in:
Bibliographic Details
Main Authors: Gaithuru, J. N., Bakhtiari, M., Salleh, M., Muteb, A. M.
Format: Conference or Workshop Item
Published: Institute of Electrical and Electronics Engineers Inc. 2016
Subjects:
Online Access:http://eprints.utm.my/id/eprint/73267/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84974575052&doi=10.1109%2fMySEC.2015.7475227&partnerID=40&md5=7234b1cc137dde907a90f607f68aac94
Tags: Add Tag
No Tags, Be the first to tag this record!