Suggestions for Further Reading
Public-key cryptography was born from the seminal works of Diffie and Hellman  and Rivest, Shamir and Adleman . Though still young, this area has induced much research in the last three decades. In this chapter, we have made an attempt to summarize some important cryptographic algorithms proposed in the literature. The original papers where these techniques have been introduced are listed below. We don’t plan to be exhaustive, but mention only the most relevant resources.
|XTR encryption||[170, 172, 171, 173, 289, 297]|