next up previous
Next: Slide 56 Up: Network Security Previous: Slide 54

Public Key Algorithms

\begin{figure}\centerline{\epsfig{figure=/home/sri/courses/figs/eps/asymm-key,width=5in}}
\end{figure}



Sridhar Iyer
2001-01-08