skip to main content
chapter

New Directions in Cryptography

Published:26 August 2022Publication History
First page image

References

  1. 1.R. Merkle, “Secure communication over an insecure channel,” submitted to Communications of the ACM. [This was subsequently published in volume 21, no. 4. pp. 294–299, April 1978.]Google ScholarGoogle Scholar
  2. 2.D. Kahn, The Codebreakers, The Story of Secret Writing. New York: Macmillan, 1967.Google ScholarGoogle Scholar
  3. 3.C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, Oct. 1949.Google ScholarGoogle ScholarCross RefCross Ref
  4. 4.M. E. Hellman, “An extension of the Shannon theory approach to cryptography,” submitted to IEEE Trans. Inform. Theory. [This was subsequently published in volume 23, no. 5. pp. 289–294, May 1977.]Google ScholarGoogle Scholar
  5. 5.W. Diffie and M. E. Hellman, “Multiuser cryptographic techniques,” presented at National Computer Conference, New York, June 7–10, 1976.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.D. Knuth, The Art of Computer Programming, Vol. 2, Semi-Numerical Algorithms. Reading, MA.: Addison–Wesley, 1969.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.——, The Art of Computer Programming, Vol. 3, Sorting and Searching. Reading, MA.: Addison–Wesley, 1973.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.S. Pohlig and M. E. Hellman, “An improved algorithm for computing algorithms in GF(p) and its cryptographic significance,” submitted to IEEE Trans. Inform. Theory. [This was subsequently published in volume IT 24, No. 1, pp. 106–110, January 1978.]Google ScholarGoogle Scholar
  9. 9.M. V. Wilkes, Time-Sharing Computer Systems. New York: Elsevier, 1972.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.A. Evans, Jr., W. Kantrowitz, and E. Weiss, “A user authentication system not requiring secrecy in the computer.” Communications of the ACM, vol. 17, pp. 437–442, Aug. 1974.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.G. B. Purdy, “A high security log-in procedure,” Communications of the ACM, vol. 17, pp. 442–445, Aug. 1974.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.W. Diffie and M. E. Hellman, “Cryptanalysis of the NBS data encryption standard” submitted to Computer. [This was subsequently published in volume 10, No. 6, pp. 74–84, June 1977.]Google ScholarGoogle Scholar
  13. 13.A. V. Aho, J. E. Hopcroft, and J. D. Ullman, The Design and Analysis of Computer Algorithms. Reading, MA.: Addison–Wesley, 1974.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.R. M, Karp, “Reducibility among combinatorial problems,” in Complexity of Computer Computations. R. E. Miller and J. W. Thatcher, Eds. New York: Plenum, 1972, pp. 85–104.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. New Directions in Cryptography
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM Books
                Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman
                August 2022
                558 pages
                ISBN:9781450398275
                DOI:10.1145/3549993

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 26 August 2022

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • chapter

                Appears In

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader