The document discusses several cryptosystems used for public-key encryption, including RSA, Diffie-Hellman key exchange, and elliptic curve cryptography. It provides background on necessary mathematical concepts like modular arithmetic, primes, and discrete logarithms. The author analyzes the security, efficiency, and ability to withstand large adversaries of each cryptosystem to determine the most effective for public-key encryption.