Return to Article Details An asymmetric cryptography using Gaussian integers Download Download PDF