Back to Results
First PageMeta Content
Public-key cryptography / Key size / Cryptanalysis / Cypherpunk / Key exchange / Symmetric-key algorithm / Bruce Schneier / Key / Block cipher / Cryptography / Key management / Whitfield Diffie


Foreword By Whitfield Diffie The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less
Add to Reading List

Document Date: 2009-10-10 01:49:56


Open Document

File Size: 2,77 MB

Share Result on Facebook

City

Oakland / Mountain View / Oak Park / New York / /

Company

IBM Watson Laboratory / Peachpit Press / Counterpane Systems / NSA / Riverbank Laboratories / Fiat / RSA Data Security Inc. / AT&T Bell Labs / Bell System Technical Journal / Needham / John Wiley & Sons / /

Continent

America / /

Country

France / Canada / United Kingdom / Israel / United States / Soviet Union / /

/

Facility

IBM Watson Laboratory / Stanford bookstore / /

IndustryTerm

Internet access / important algorithms / far key escrow products / cryptographic utilities / resistant chips / block algorithms / identification algorithms / law enforcement authorities / cryptographic equipment / stream algorithms / cryptographic algorithms / Law enforcement / control law / secret algorithm / cryptography products / digital signature algorithms / real communications requirements / foe devices / Export applications / cryptographic protocols / cryptographic products / encryption algorithms / list algorithms / /

OperatingSystem

Macintosh / /

Organization

International Association for Cryptologic Research / American Council on Education / Caveat Emptor Chapter / Munitions Control Board / Advisory Board / Electronic Privacy Information Center / United States Army / Clinton administration / Air Force / Public-Key Key Management Chapter / Key Escrow Chapter / Random and Pseudo-Random-Sequence Generation Chapter / National Security Agency / Secrets Chapter / Databases Chapter / Department of State / Congress / Cryptographic Protocols Chapter / Author Chapter / Ciphers Chapter / Cryptographic Techniques Chapter / Stanford / /

Person

Claude Cr / Phil Karn / Carol Kennedy / Gideon Yuval / Ross Anderson / Marc Schwartz / Martin Hellman / Joan Daemen / Michael Roe / Don Alvarez / Leisa Condie / Tom Leranth / Phil Zimmermann / Michael Wood / Carl Ellison / Mark Goresky / Karl Barrus / Dmitry Titov / Paul Kocher / Kazue Sako / Karen Cooper / Bruce McNair / Matt Robshaw / Dan Bernstein / Joan Boyar / Richard Outerbridge / Dobb / Bart Preneel / Martin Luther King Jr. / Rosario Gennaro / Markus Stadler / Dieter Gollmann / Kenneth Iversen / Matt Franklin / Joan Feigenbaum / Bill Leininger / Matt Blaze / Richard Graveman / Joachim Schurman / Jim Massey / Bruce Schneier Oak Park / Colin Plumb / Edward H. Hebern / Burt Kaliski / William Hugh Murray / Randy Seuss / Claude Shannon / Jorge Davila / Peter Gutmann / Dave Banisar / Serge Vaudenay / Peter Pearson / Lars Knudsen / Stuart Haber / Paul Rubin / Dave Balenson / Mark Riordan / Jimmy Upton / Glen Zorn / Abe Abraham / William F. Friedman / Avi Rubin / Jeff Duntemann / Alan Insley / Steve Bellovin / Mike Markowitz / Charles Pfleeger / Jan Camenisch / Ken Pizzini / Chris Johnston / Eli Biham / Marc Vauclair / Jon Erickson / Ralph Merkle / Paul MacNerland / Bob Hogue / Neal Koblitz / Markus Jakobsson / David Kahn / Roger Needham / Paul Leyland / Gary Carter / Bruce Schneier / Horst Feistel / Mahmoud Salmasizadeh / Phil Rogaway / Matt Bishop / Bill Patton / /

Position

president / engineer / Author / representative / programmer / contributing editor / contemporary programmer / contemporary researcher / aspiring cryptosystem designer / board member / member / a contributing editor to Dr. Dobb’s Journal / Bishop / /

ProgrammingLanguage

A sharp / /

ProvinceOrState

New York / Connecticut / Missouri / California / Georgia / Vermont / Maryland / Illinois / Nevada / /

PublishedMedium

the Bell System Technical Journal / /

Region

former Soviet Union / /

SportsLeague

International Association / /

Technology

key encryption algorithms / 1.6 Computer Algorithms / stream algorithms / 10 algorithms / 5 Hardware Encryption / key algorithms / list algorithms / Encryption / cryptography / important algorithms / block algorithms / Clipper chip / digital signature algorithms / cryptographic algorithms / Digital Cash / key key exchange algorithms / use algorithms / secret algorithm / 10.7 Detecting Encryption / key identification algorithms / /

SocialTag