Suggestions for Further Reading

Public-key cryptography was born from the seminal works of Diffie and Hellman [78] and Rivest, Shamir and Adleman [252]. Though still young, this area has induced much research in the last three decades. In this chapter, we have made an attempt to summarize some important cryptographic algorithms proposed in the literature. The original papers where these techniques have been introduced are listed below. We don’t plan to be exhaustive, but mention only the most relevant resources.

AlgorithmReference(s)
RSA encryption[252]
Rabin encryption[246]
Goldwasser–Micali encryption[117]
Blum–Goldwasser encryption[27]
ElGamal encryption[84]
Chor–Rivest encryption[54]
XTR encryption[170, 172, 171, 173, 289, 297]
NTRU encryption

Get Public-key Cryptography: Theory and Practice now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.