Select correct statements regarding asymmetric-key encryption methods.
a) Asymmetric-key encryption is also called public-key encryption.
b) Asymmetric-key encryption is also called symmetric-key encryption.
c) Asymmetric-key encryption involves the use of the same key for encryption and decryption.
d) Asymmetric-key encryption is computationally less complex than symmetric-key encryption.