Democratizing cryptography : the work of Whiteld Diffie and Martin Hellman
Saved in:
| Other Authors | |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
[New York, NY, USA] :
Association for Computing Machinery;
[2022].
|
| Edition | First Edition. |
| Series | ACM books ;
#42. |
| Subjects | |
| Online Access | Full text |
| ISBN | 9781450398282 9781450398268 9781450398275 9781450398251 |
| ISSN | 2374-6777 ; |
| Physical Description | 1 online zdroj (xx, 538 stran) |
Cover
| LEADER | 00000cam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 108507 | ||
| 003 | CZ-ZlUTB | ||
| 005 | 20251008112132.0 | ||
| 006 | m o d | ||
| 007 | cr ||||||||||| | ||
| 008 | 220824t20222022nyua ob 001 0deng d | ||
| 040 | |a SFB |b eng |e rda |c SFB |d STF |d ORU |d UAB |d GZM |d CUS |d OCLCF |d OCLCQ | ||
| 020 | |a 9781450398282 |q (ebook) | ||
| 020 | |a 9781450398268 |q (epub) | ||
| 020 | |z 9781450398275 |q (hardcover) | ||
| 020 | |z 9781450398251 |q (paperback) | ||
| 024 | 7 | |a 10.1145/3549993 |2 doi | |
| 035 | |a (OCoLC)1343255189 | ||
| 245 | 0 | 0 | |a Democratizing cryptography : |b the work of Whiteld Diffie and Martin Hellman / |c Rebecca Slayton, editor. |
| 250 | |a First Edition. | ||
| 264 | 1 | |a [New York, NY, USA] : |b Association for Computing Machinery; |c [2022]. | |
| 264 | 4 | |c ©2022 | |
| 300 | |a 1 online zdroj (xx, 538 stran) | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a počítač |b c |2 rdamedia | ||
| 338 | |a online zdroj |b cr |2 rdacarrier | ||
| 490 | 1 | |a ACM books, |x 2374-6777 ; |v #42 | |
| 504 | |a Obsahuje bibliografické odkazy a index. | ||
| 505 | 8 | |a 1 Introduction: The Early Lives and Lasting Legacies of Whitfield Diffie and Martin Hellman -- Rebecca Slayton -- 1.1 Introduction -- 1.2 Early Life and Socialization -- 1.3 Different Paths to Cryptography -- 1.4 Finding an Intellectual Soul Mate -- 1.5 New Directions in Cryptography -- 1.6 Changing the World: The Chapters Ahead -- References | |
| 505 | 8 | |a 2 Public Key Cryptography's Impact on Society: How Diffie and Hellman Changed the World -- Paul C. van Oorschot -- 2.1 Introduction -- 2.2 Security Background -- 2.3 Context: Motivation and Environment -- 2.4 Inventive Contributions -- 2.5 Supporting and Related Developments -- 2.6 Major Impacts on Society -- 2.7 Concluding Remarks -- Acknowledgments -- References | |
| 505 | 8 | |a 3 Public Key Cryptography in Computer and Network Security -- Paul Kocher -- 3.1 Symmetric Encryption and the Challenge of Scaling Communications Security -- 3.2 Key Management Before Public Key Cryptography -- 3.3 Public Key Cryptography -- 3.4 Digital Signatures and Certificates -- 3.5 Securing Internet Communications -- 3.6 Security Protocols -- 3.7 Beyond Communication -- 3.8 Securing Supply Chains -- 3.9 Protecting Software. . . and Protecting from Software -- 3.10 Protecting Stored Data -- 3.11 Securing Implementations -- 3.12 The Need for Aligned Interests and Transparency -- 3.13 The Potential Impact of Quantum Computing -- 3.14 The Future -- References | |
| 505 | 8 | |a 4 The Influence of Public-Key Cryptography on Mathematics -- Johannes Buchmann, Michael J. Jacobson, Jr., and Hugh C. Williams -- 4.1 Introduction -- 4.2 Primes -- 4.3 Factoring Integers -- 4.4 Discrete Logarithms -- 4.5 Elliptic Curves -- 4.6 Algebraic Number Fields -- 4.7 The Quantum Computer -- 4.8 Quantum-resistant Methods -- 4.9 Conclusion -- References | |
| 505 | 8 | |a 5 A Gift that Keeps on Giving: The Impact of Public-Key Cryptography on Theoretical Computer Science -- Joan Feigenbaum -- 5.1 Introduction -- 5.2 New Concepts in TCS -- 5.3 New Characterizations of Complexity Classes -- 5.4 Conclusion -- References | |
| 505 | 8 | |a 6 Creating an Open Community of Cryptographers -- Hilarie Orman -- 6.1 Introduction -- 6.2 Initialization -- 6.3 Shifting in Parallel -- 6.4 Expanding in New Directions with New People -- 6.5 Compression -- 6.6 Expansion -- 6.7 Permutation and Translation -- 6.8 Output -- 6.9 Timeline of Early Events in the Discovery of Public-key Cryptography -- References | |
| 505 | 8 | |a 7 The Development of a Crypto Policy Community: Diffie-Hellman's Impact on Public Policy -- Susan Landau -- 7.1 The Prologue -- 7.2 These, Our Actors -- 7.3 Action from an Unexpected Front: The Pentagon Papers and the White House "Plumbers" -- 7.4 You Can't Publish That-and Other Forms of Control -- 7.5 A Shift to Controlling Federal Encryption Standards -- 7.6 Controlling the Sale of Cryptography -- 7.7 The Second Crypto War -- 7.8 The Lasting Public Policy Legacy of Diffie and Hellman's Work -- Acknowledgments -- References | |
| 505 | 8 | |a 8 An Interview with Whitfield Diffie | |
| 505 | 8 | |a 9 An Interview with Martin Hellman | |
| 505 | 8 | |a 10 Information Security | |
| 505 | 8 | |a 11 Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic | |
| 505 | 8 | |a 12 New Directions in Cryptography -- Whitfield Diffie and Martin E. Hellman -- Abstract -- 12.1 Introduction -- 12.2 Conventional Cryptography -- 12.3 Public Key Cryptography -- 12.4 One Way Authentication -- 12.5 Problem Interrelations and Trap Doors -- 12.6 Computational Complexity -- 12.7 Historical Perspective -- References | |
| 505 | 8 | |a 13 Exhaustive Cryptanalysis of the NBS Data Encryption Standard -- Whitfield Diffie and Martin E. Hellman -- 13.1 Introduction -- 13.2 The Basic Argument -- 13.3 Objections to the Basic Argument -- 13.4 System Architecture -- 13.5 Chip Design -- 13.5 Chip Design -- 13.7 Variable Key-size Techniques -- 13.8 Discussion -- Acknowledgment -- References | |
| 505 | 8 | |a 14 An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance -- Stephen C. Pohlig and Martin E. Hellman -- Abstract -- 14.1 Introduction -- 14.2 Use in Cryptography -- 14.3 An Algorithm for p = 2n + 1 -- 14.4 An Algorithm for Arbitrary Primes -- 14.5 Discussion -- References | |
| 505 | 8 | |a 15 Privacy and Authentication: An Introduction to Cryptography -- Whitfield Diffie and Martin E. Hellman -- Abstract -- 15.1 Introduction -- 15.2 Cryptographic Fundamentals -- 15.3 Examples of Systems and Solutions -- 15.4 Cryptographic Taxonomy -- 15.5 Cryptography in Practice -- 15.6 Applications of Cryptography -- 15.7 Selected Bibliography -- References -- Contributors | |
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 650 | 0 | |a Cryptography. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Slayton, Rebecca, |e editor. | |
| 776 | 0 | 8 | |i Print version: |z 9781450398275 |z 9781450398251 |
| 830 | 0 | |a ACM books ; |v #42. | |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://dl.acm.org/doi/book/10.1145/3549993 |
| 992 | |c EBOOK-TN |c ACM | ||
| 999 | |c 108507 |d 108507 | ||
| 993 | |x NEPOSILAT |y EIZ | ||