A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap
Information security has become a key concern for communication over public channels thus necessitating the use of cryptography to safeguard communication. In this paper, we present a comprehensive review of the asymmetric key algorithms, beginning from the inception of asymmetric cryptography in 19...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2016
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/73267/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-84974575052&doi=10.1109%2fMySEC.2015.7475227&partnerID=40&md5=7234b1cc137dde907a90f607f68aac94 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|