Asymmetric Cryptography

Name Full Name Trapdoor Function Computational Complexity Private Key Public Key Message Hash
RSA Rivest, Shamir, Adelmen prime factorization,
difficulty of factorization
δ
δ ∈ ℤ+
(μ, ε)
μ, ε ∈ ℤ+
m
m ∈ ℤ+
ECC Elliptic Curve Cryptography number of times k
k ∈ ℤ+
(x, y)
x, y ∈ ℤ+
e or z
e, z ∈ ℤ+