_______ are used as the base of the Public Key Infrastructure.
(a) SSL certificates
(b) TLS certificates
(c) X.509 certificates
(d) HAS certificates
I have been asked this question during an interview.
I'd like to ask this question from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics