Are all categories of assymetric key generation applicable to all categories of assymetric key exchange?

Context assumption and aim: Using asymmetric crypto to help Alice and Bob (members belonging to the same basketball club. The club has its own servers) to communicate together without the conversation being intercepted/modif… Continue reading Are all categories of assymetric key generation applicable to all categories of assymetric key exchange?