27

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Footnote 27

Because of the mathematical relationship between the public and private keys which correspond to each other as a key pair. Schneier, supra note 18, at § 2.6, 34-41.