ěhave considered:
ldistribution of public keys
lpublic-key distribution of secret keys
lDiffie-Hellman key exchange
lElliptic Curve cryptography