Feature: Considerations for New Public-Key Algorithms

Public-key algorithms have emerged as a critical security technology over the past two decades. The first generation of public-key algorithms are based on hard problems from number theory.