Answer Posted / tharani
RSA, ECC (Elliptical Curve Cryptography), Diffie-Hellman,
El-Gamal, LUC etc.,
ECC is the most popular Asymmetric Algorithm. For further
read refer this page
http://www.infosys-security-review.com/Cryptography-
Standards.html
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
How to make backups?
What are typical key spaces for symmetric and asymmetric ciphers?
What makes a product cipher secure?
Name different symmetric ciphers?
Why do you keep the name of the used cipher in the open?
Does IAIK support RC4 ? Is the code written the same way as for RC2 ?
what is CBC?
What are the most important attacks on symmetric block ciphers?
Exactly how strong are these ciphers?
What exactly is DES?
hi,pls help me for the preparation of interview for iob's it manager post?
How to encrypt swap?
How are block ciphers used to encrypt data longer than the block size?
shall we use a journalling filesystem on top of /dev/loop?
What is differential cryptanalysis?