Asymmetric Cryptography and Key Management (Coursera)
Categories
Effort
Languages
In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair [...]
Jun 27th 2022