Back to Results
First PageMeta Content
Cryptanalysis / One-way function / Key / RSA / Password / Cryptographic protocol / Cryptosystem / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / One-time pad


New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to
Add to Reading List

Document Date: 2001-12-26 10:46:32


Open Document

File Size: 260,36 KB

Share Result on Facebook

City

Ronneby / Lenox / /

Company

Massachusetts Computer Associates / Stanford Artificial Intelligence Laboratory / Needham / /

Country

Sweden / /

Currency

pence / USD / /

Facility

Stanford University / Stanford Artificial Intelligence Laboratory / /

IndustryTerm

build systems / secure systems / cryptanalytic algorithm / authentication systems / inverse algorithm / authentication applications / meaningful solutions / apparent difficulty computing logarithms / mechanical computing / communications technology / inverse algorithms / electronic authentication systems / classes systems / Public key distribution systems / mind systems / function login protocol / digital hardware / setup protocol / possible solution / cryptographic systems / situation multiuser networks / partial solution / business communications / telecommunications / connection protocol / grade cryptographic devices / telephone line / telephone communication / partial solutions / cryptographic device / communication networks / contemporary business communications / telecommunications systems / /

NaturalFeature

Shannon / /

Organization

National Science Foundation / Stanford University / /

Person

Leslie Lamport / /

Position

critic / skilled locksmith / stockbroker / salesman / designer / /

ProvinceOrState

Saskatchewan / California / Massachusetts / /

SportsLeague

Stanford University / /

Technology

function login protocol / inverse algorithm / block cipher / communications technology / private key / secret key / connection protocol / encryption / Cryptography / public key / setup protocol / digital signature / public key system / /

SocialTag