This book provides a thorough treatment of the celebrated composition of signature and encryption transformations
The text takes an instructive approach to analyze and explain the shortcomings of the existing paradigms used to build the necessary cryptographic primitives
The author endeavors to gradually supplement and reinforce the security model in which the primitives are being analyzed