Paper Recommendation
2000 Quantum Computation and Quantum information

1985 Identity-based Cryptosystems and Signature Schemes

1978 A Method For Obtaining Digital Signatures and Public-key Cryptosystems

1976 New Directions in Cryptography

1985 A Public Key Cryptosystem and A Signature Scheme Based on Discrete Logarithms

2003 Identity-Based Encryption From The Weil Pairing

1979 DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION

1978 Compression of individual Sequences Via Variable-rate Coding

1983 On The Security of Public Key Protocols

1978 Using Encryption For Authentication in Large Networks of Computers

2003 Guide To Elliptic Curve Cryptography

1985 Verifiable Secret Sharing and Achieving Simultaneity in The Presence of Faults

1981 Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms

1983 Randomized Byzantine Generals

1979 Secrecy, Authentication, and Public Key Systems.

1996 Decentralized Trust Management

1987 How To Prove Yourself: Practical Solutions To Identification and Signature Problems

2000 A New Remote User Authentication Scheme Using Smart Cards

1986 A Global Authentication Service Without Global Trust

1983 How To Exchange (secret) Keys