Asymmetric Cryptography

This lecture will address Asymmetric Cryptography and its use to both secure and authenticate communications.

Download here

  • Segurança em Redes Informáticas, A. Zúquete: Chap. 2
  • Ross Anderson, Security engineering, Third Edition, Chapter 5.
Previous
Next