This book provides a thorough treatment of the celebrated composition of signature and encryption transformations The text takes an instructive approach to analyze and explain the shortcomings of the existing paradigms used to build the necessary cryptographic primitives The author endeavors to gradually supplement and reinforce the security model in which the primitives are being analyzed