This book explores a variety of public-key cryptography topics. It discusses the use of exponentiation and multi-exponentiation as well as the theory of demonstrably safe public-key cryptography. Provable security is explained in detail.

It gives the underlying mathematics required to construct and analyze these cryptographic systems as needed and examines attacks on the schemes via fundamental mathematical issues, such as the discrete logarithm problem and the difficulty of factoring integers.