Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 95. Chapters: RSA, Public-key cryptography, Fermat pseudoprime, Elliptic curve cryptography, Diffie-Hellman key exchange, ElGamal encryption, Digital Signature Algorithm, Merkle-Hellman knapsack cryptosystem, XTR, NTRUEncrypt, Schoof's algorithm, Primality test, Quantum digital signature, Public key infrastructure, Hidden Field Equations, McEliece cryptosystem, Rabin cryptosystem, Wiener's Attack, Web of trust, Lamport signature, Hyperelliptic curve cryptography, Secure Remote Password protocol, Paillier cryptosystem, Transient-key cryptography, Three-pass protocol, Public key fingerprint, Cramer-Shoup cryptosystem, Diffie-Hellman problem, Unbalanced Oil and Vinegar, Elliptic Curve DSA, Signcryption, Cayley-Purser algorithm, Goldwasser-Micali cryptosystem, Blum-Goldwasser cryptosystem, Registration authority, Merkle signature scheme, Implicit certificate, ECC patents, Optimal asymmetric encryption padding, Decisional Diffie-Hellman assumption, Table of costs of operations in elliptic curves, Niederreiter cryptosystem, SAFE-BioPharma Association, RSA problem, SPEKE, Key encapsulation, IEEE P1363, MQV, ElGamal signature scheme, Rabin signature algorithm, XDH assumption, CEILIDH, Damgard-Jurik cryptosystem, NTRUSign, Okamoto-Uchiyama cryptosystem, Jumbleme, Integrated Encryption Scheme, Elliptic curve Diffie-Hellman, Naccache-Stern cryptosystem, Encrypted key exchange, Merkle's Puzzles, Schoof-Elkies-Atkin algorithm, Benaloh cryptosystem, Computational Diffie-Hellman assumption, Schnorr signature, Naccache-Stern knapsack cryptosystem, Efficient Probabilistic Public-Key Encryption Scheme, Certificate-based encryption, Schmidt-Samoa cryptosystem, Full Domain Hash, Schnorr group, Certificateless cryptography, Threshold cryptosystem, Strong RSA assumption, Distributed key generation, Bilateral key...