pdf online search and view
Related

widely, and private keys which are known only to the owner. This accomplishes two functions: authentication, which is when the public key is used to verify

her own private / public key pair, plug Bob's public key into her private key, produce a fake shared secret key, and solve for Bob's private key (and use