Suggestions for Further Reading
Public-key cryptography was born from the seminal works of Diffie and Hellman  and Rivest, Shamir and Adleman . Though still young, this area has induced much research in the last three decades. In this chapter, we have made an attempt to summarize some important cryptographic algorithms proposed in the literature. The original papers where these techniques have been introduced are listed below. We don’t plan to be exhaustive, but mention only the most relevant resources.
|XTR encryption||[170, 172, 171, 173, 289, 297]|
Get Public-key Cryptography: Theory and Practice now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.