Aplikácie asymetrického šifrovania v informačnej bezpečnosti

2011 
The thesis is focused on applications of asymmetric cryptography in information security. The first chapter focuses on the description of the principles of asymmetric cryptography. In the second chapter there is surveying the most commonly used algorithms of asymmetric cryptography. The third chapter describes how to use asymmetric encryption in practice. The fourth chapter is a proposal to present the principles of selected asymmetric cryptography algorithm.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []