See Asymmetric-key algorithm.
Source(s):
NIST SP 800-133 Rev. 2
under Public-key algorithm
NIST SP 800-133
[Superseded]
under Public-key algorithm
NIST SP 800-133 Rev.1
[Superseded]
under Public-key algorithm
A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that determining the private key from the public key is computationally infeasible.
Source(s):
NIST SP 800-57 Part 2 Rev.1
under Public-key (asymmetric) cryptographic algorithm
NIST SP 800-56B Rev. 1
[Superseded]
under Public-key algorithm
NIST SP 800-57 Part 2
[Superseded]
under Public key (asymmetric) cryptographic algorithm
See Public-key cryptographic algorithm.
Source(s):
NIST SP 800-57 Part 1 Rev. 5
under Asymmetric-key algorithm
NIST SP 800-57 Part 1 Rev. 3
[Superseded]
under Asymmetric key algorithm
NIST SP 800-57 Part 1 Rev. 4
[Superseded]
under Asymmetric key algorithm
A cryptographic algorithm that uses two related keys: a public key and a private key. The two keys have the property that determining the private key from the public key is computationally infeasible.
Source(s):
NIST SP 800-175B Rev. 1
under Public key (asymmetric-key) cryptographic algorithm
NIST SP 800-56B Rev. 2
under Public-key algorithm
NIST SP 800-57 Part 1 Rev. 5
under Public-key (asymmetric-key) cryptographic algorithm
NIST SP 800-57 Part 1 Rev. 3
[Superseded]
under Public-key (asymmetric) cryptographic algorithm
NIST SP 800-57 Part 1 Rev. 4
[Superseded]
under Public-key (asymmetric) cryptographic algorithm
See public-key algorithm.
Source(s):
NIST SP 800-175B Rev. 1
under Asymmetric-key algorithm
A cryptographic algorithm that uses two related keys: a public key and a private key. The two keys have the property that determining the private key from the public key is computationally infeasible; also known as a public-key algorithm.
Source(s):
NIST SP 800-133 Rev. 2
under Asymmetric-key algorithm
A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that determining the private key from the public key is computationally infeasible. Also known as a public-key algorithm.
Source(s):
NIST SP 800-133
[Superseded]
under Asymmetric-key algorithm
NIST SP 800-133 Rev.1
[Superseded]
under Asymmetric-key algorithm
See Public key cryptographic algorithm.
Source(s):
NIST SP 800-57 Part 2
[Superseded]
under Asymmetric key algorithm