Topics
1. Diffie, Hellman: New Directions in Cryptography (1976)
2. Merkle: Secure Communications over Insecure Channels (1978)
3. Rivest, Shamir, Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (1978)
4. Shamir: How to Share a Secret (1979)
5. Goldwasser, Micali: Probabilistic Encryption & How to Play Mental Poker Keeping Secret All Partial Information (1982)
6. Goldreich, Goldwasser, Micali: How to Construct Random Functions (1986)
7. Goldwasser, Micali, Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks (1988)
8. Micali, Rogaway: Secure Computation (Abstract) (1991)
9. Bellare Rogaway: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols (1993)
10. Bellare, Canetti, Krawczyk: Keying Hash Functions for Message Authentication (1996)
11. Joux: A One Round Protocol for Tripartite Diffie-Hellman (2000)
12. Coron, Dodis, Malinaud, Puniya: Merkle-Damgård Revisited: how to Construct a Hash Function (2005)