Back to Results
First PageMeta Content
Cipher / Key size / One-time pad / Cryptanalysis / Vigenère cipher / Substitution cipher / Alice and Bob / Key / Index of cryptography articles / Cryptography / Public-key cryptography / RSA


This article was published in 2003 and has not been updated or revised. ® BEYOND DISCOVERY T H E PAT H F R O M R E S E A R C H T O H U M A N B E N E F I T
Add to Reading List

Document Date: 2014-08-04 15:09:41


Open Document

File Size: 670,01 KB

Share Result on Facebook

City

Washington / D.C. / /

Company

AT&T Research / /

Country

Germany / India / France / /

Currency

USD / /

Facility

Stanford University / Indian Institute of Technology / /

IndustryTerm

public-key systems / mathematical tools / e-commerce / computer word processors / polynomial-time testing algorithm / computer technology / mathematical systems / online transactions / final product / public-key algorithms / bank / encryption systems / encryption algorithm / e-th / electronic commerce / /

Organization

National Academy of Sciences / Indian Institute of Technology in Kanpur / British intelligence / Stanford University / /

Person

Manindra Agrawal / Carl Friedrich Gauss / Dana Mackenzie / Martin Hellman / Leonard Adleman / Carl Pomerance / Blaise de Vigenère / Peter Shor / Whitfield Diffie / Charles Babbage / Pierre de Fermat / Adi Shamir / Alan Turing / Bob / John Pollard / Ronald Graham / Barry Mazur / Ralph Merkle / Neeraj Kayal / Alice / Moses Liskov / Plaintext / James Ellis / Ronald Rivest / Nitin Saxena / Kenneth Ribet / /

Position

BUTCHER / single spy / mathematician / spy / diplomat / science writer / banker / bank teller / /

ProgrammingLanguage

R / C / /

ProvinceOrState

British Columbia / /

PublishedMedium

Scientific American / /

SportsLeague

Stanford University / /

Technology

symmetrickey encryption / ATM / private key / computer technology / public key Hashing algorithm Hashing algorithm / encryption / cryptography / public key / computer word processors / public-key encryption / ASCII / public-key algorithms / encryption system / RSA encryption algorithm / digital signature / polynomial-time testing algorithm / /

SocialTag