Select correct statements regarding asymmetric-key encryption methods. a) Asymmetric-key encryption is also called public-key encryption. b) Asymmetric-key encryption is also called symmetric-key encryption. c) Asymmetric-key encryption involves the use of the same key for encryption and decryption. d) Asymmetric-key encryption is computationally less complex than symmetric-key encryption.