1. The document discusses public key cryptography concepts like Diffie-Hellman key exchange, finite fields, discrete logarithm problems, key encapsulation mechanisms, and the security properties of IND-CCA security. 2. It provides examples of finite field arithmetic and constructions of finite fields and explains how fields can be extended. 3. The document compares public key cryptography and comm
![クラウドを支えるこれからの暗号技術](https://cdn-ak-scissors.b.st-hatena.com/image/square/82ef69cc13d322ca9e2266e2477ed05446782b65/height=288;version=1;width=512/https%3A%2F%2Fcdn.slidesharecdn.com%2Fss_thumbnails%2Fdevsumi2015-150218232821-conversion-gate02-thumbnail.jpg%3Fwidth%3D640%26height%3D640%26fit%3Dbounds)