Content deleted Content added
No edit summary |
No edit summary |
||
Line 4:
its secret.
When signing or decrypting the system is essentially the same as conventional private
Originally when this system was first developed in 1984 by [[Adi Shamir]] it could only be used for keys for digital signatures, however recently this method has been extended to cryptography.
|