This lecture will address Asymmetric Cryptography and its use to both secure and authenticate communications.
Download here
Recommended reading
- Segurança em Redes Informáticas, A. Zúquete: Chap. 2
- Ross Anderson, Security engineering, Third Edition, Chapter 5.