Building a More Trusted Data World: Authenticated ElGamal Encryption using Kryptology
And Just Ready for Homomorphic Encryption
Published in
3 min readDec 12, 2021
Let’s look at the beauty of combining public-key encryption, symmetric key encryption and authenticated ciphertexts.
As an active researcher, the first thing I do when an important new research-focused software library comes…