Asymmetric cryptography
Appearance
Cryptography that uses two separate keys to exchange data — one to encrypt or digitally sign the data and one to decrypt the data or verify the digital signature. Also known as public-key cryptography.
Source: FIPS 204 | Category: