Next: 3.3.5 How is information
Up: 3.3 Data Security: Cryptography
Previous: 3.3.3 What is public
A specialized piece of computer hardware and/or software generates key
pairs on demand according to the method defined by the PKC standards.
Denis Arnaud
12/19/1997