Contents:
1-Key management
2-Distribution of Secret Keys Using Public-Key Cryptography
3-Diffie-Hellman Key Exchange algorithm
4-Example of Diffie-Hellman Key Exchange algorithm
5-Key Exchange Protocols
6-Man-in-the-Middle Attack
7-The abelian group
8-Elliptic Curves over Real Numbers
9-Elliptic Curves over Zp
10-Elliptic Curves over GF(2m)