Why Computer Scientists Consult Oracles| Quanta Magazine
Cryptography that uses two separate keys to exchange data — one to encrypt or digitally sign the data and one to decrypt the data or verify the digital signature. Also known as public-key cryptography.| csrc.nist.gov