Examples of implementation of asymmetric encryption algorithms
Keywords:
information security, algorithm, electronic digital signature, encryption, decryption, encoding, crypto schemeAbstract
The article deals with cryptographic information security. Showing examples of asymmetric encryption algorithms. Details disclosed technology of electronic digital signatures. It sets out the conditions of asymmetric cryptography. Concrete examples of algorithms that eliminate redundant data recording. Analyzed data compression algorithms, algorithms for backup.
Downloads
Published
2015-12-29
How to Cite
Smirnova М., Samoilova, I., & Ustinova, L. (2015). Examples of implementation of asymmetric encryption algorithms. Bulletin of the Karaganda University. Mathematics Series, 4(80), 108–114. Retrieved from https://mts.buketov.edu.kz/mathematics-vestnik/article/view/69
Issue
Section
MATHEMATICS







