Computer Science, asked by naveensrichakra2904, 1 year ago

For authentication using public-key cryptography, encryption is carried out using a. Receiver’s public key b. Receiver’s private key c. Sender’s public key d. Sender’s private key

Answers

Answered by charlie1505
0

Answer:

a) Receivers public key

Similar questions