I want 4-5 pages, not including the cover page and references, that talk about the authentication in the algorithms.
I expect to see how authentications work in the asymmetric and symmetric keys. Include some figures/tables please.
references should not be published before 2017