• Add references
  • Add an example of the key generation, message encryption, and message decryption scheme