Home Tags What alternative term can be used to describe asymmetric cryptographic algorithms?

what alternative term can be used to describe asymmetric cryptographic algorithms?