Democratizing cryptography : the work of Whiteld Diffie and Martin Hellman

Saved in:
Bibliographic Details
Other Authors Slayton, Rebecca (Editor)
Format Electronic eBook
LanguageEnglish
Published [New York, NY, USA] : Association for Computing Machinery; [2022].
EditionFirst Edition.
SeriesACM books ; #42.
Subjects
Online AccessFull text
ISBN9781450398282
9781450398268
9781450398275
9781450398251
ISSN2374-6777 ;
Physical Description1 online zdroj (xx, 538 stran)

Cover

LEADER 00000cam a2200000 i 4500
001 108507
003 CZ-ZlUTB
005 20251008112132.0
006 m o d
007 cr |||||||||||
008 220824t20222022nyua ob 001 0deng d
040 |a SFB  |b eng  |e rda  |c SFB  |d STF  |d ORU  |d UAB  |d GZM  |d CUS  |d OCLCF  |d OCLCQ 
020 |a 9781450398282  |q (ebook) 
020 |a 9781450398268  |q (epub) 
020 |z 9781450398275  |q (hardcover) 
020 |z 9781450398251  |q (paperback) 
024 7 |a 10.1145/3549993  |2 doi 
035 |a (OCoLC)1343255189 
245 0 0 |a Democratizing cryptography :  |b the work of Whiteld Diffie and Martin Hellman /  |c Rebecca Slayton, editor. 
250 |a First Edition. 
264 1 |a [New York, NY, USA] :  |b Association for Computing Machinery;  |c [2022]. 
264 4 |c ©2022 
300 |a 1 online zdroj (xx, 538 stran) 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a ACM books,  |x 2374-6777 ;  |v #42 
504 |a Obsahuje bibliografické odkazy a index. 
505 8 |a 1 Introduction: The Early Lives and Lasting Legacies of Whitfield Diffie and Martin Hellman -- Rebecca Slayton -- 1.1 Introduction -- 1.2 Early Life and Socialization -- 1.3 Different Paths to Cryptography -- 1.4 Finding an Intellectual Soul Mate -- 1.5 New Directions in Cryptography -- 1.6 Changing the World: The Chapters Ahead -- References 
505 8 |a 2 Public Key Cryptography's Impact on Society: How Diffie and Hellman Changed the World -- Paul C. van Oorschot -- 2.1 Introduction -- 2.2 Security Background -- 2.3 Context: Motivation and Environment -- 2.4 Inventive Contributions -- 2.5 Supporting and Related Developments -- 2.6 Major Impacts on Society -- 2.7 Concluding Remarks -- Acknowledgments -- References 
505 8 |a 3 Public Key Cryptography in Computer and Network Security -- Paul Kocher -- 3.1 Symmetric Encryption and the Challenge of Scaling Communications Security -- 3.2 Key Management Before Public Key Cryptography -- 3.3 Public Key Cryptography -- 3.4 Digital Signatures and Certificates -- 3.5 Securing Internet Communications -- 3.6 Security Protocols -- 3.7 Beyond Communication -- 3.8 Securing Supply Chains -- 3.9 Protecting Software. . . and Protecting from Software -- 3.10 Protecting Stored Data -- 3.11 Securing Implementations -- 3.12 The Need for Aligned Interests and Transparency -- 3.13 The Potential Impact of Quantum Computing -- 3.14 The Future -- References 
505 8 |a 4 The Influence of Public-Key Cryptography on Mathematics -- Johannes Buchmann, Michael J. Jacobson, Jr., and Hugh C. Williams -- 4.1 Introduction -- 4.2 Primes -- 4.3 Factoring Integers -- 4.4 Discrete Logarithms -- 4.5 Elliptic Curves -- 4.6 Algebraic Number Fields -- 4.7 The Quantum Computer -- 4.8 Quantum-resistant Methods -- 4.9 Conclusion -- References 
505 8 |a 5 A Gift that Keeps on Giving: The Impact of Public-Key Cryptography on Theoretical Computer Science -- Joan Feigenbaum -- 5.1 Introduction -- 5.2 New Concepts in TCS -- 5.3 New Characterizations of Complexity Classes -- 5.4 Conclusion -- References 
505 8 |a 6 Creating an Open Community of Cryptographers -- Hilarie Orman -- 6.1 Introduction -- 6.2 Initialization -- 6.3 Shifting in Parallel -- 6.4 Expanding in New Directions with New People -- 6.5 Compression -- 6.6 Expansion -- 6.7 Permutation and Translation -- 6.8 Output -- 6.9 Timeline of Early Events in the Discovery of Public-key Cryptography -- References 
505 8 |a 7 The Development of a Crypto Policy Community: Diffie-Hellman's Impact on Public Policy -- Susan Landau -- 7.1 The Prologue -- 7.2 These, Our Actors -- 7.3 Action from an Unexpected Front: The Pentagon Papers and the White House "Plumbers" -- 7.4 You Can't Publish That-and Other Forms of Control -- 7.5 A Shift to Controlling Federal Encryption Standards -- 7.6 Controlling the Sale of Cryptography -- 7.7 The Second Crypto War -- 7.8 The Lasting Public Policy Legacy of Diffie and Hellman's Work -- Acknowledgments -- References 
505 8 |a 8 An Interview with Whitfield Diffie 
505 8 |a 9 An Interview with Martin Hellman 
505 8 |a 10 Information Security 
505 8 |a 11 Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic 
505 8 |a 12 New Directions in Cryptography -- Whitfield Diffie and Martin E. Hellman -- Abstract -- 12.1 Introduction -- 12.2 Conventional Cryptography -- 12.3 Public Key Cryptography -- 12.4 One Way Authentication -- 12.5 Problem Interrelations and Trap Doors -- 12.6 Computational Complexity -- 12.7 Historical Perspective -- References 
505 8 |a 13 Exhaustive Cryptanalysis of the NBS Data Encryption Standard -- Whitfield Diffie and Martin E. Hellman -- 13.1 Introduction -- 13.2 The Basic Argument -- 13.3 Objections to the Basic Argument -- 13.4 System Architecture -- 13.5 Chip Design -- 13.5 Chip Design -- 13.7 Variable Key-size Techniques -- 13.8 Discussion -- Acknowledgment -- References 
505 8 |a 14 An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance -- Stephen C. Pohlig and Martin E. Hellman -- Abstract -- 14.1 Introduction -- 14.2 Use in Cryptography -- 14.3 An Algorithm for p = 2n + 1 -- 14.4 An Algorithm for Arbitrary Primes -- 14.5 Discussion -- References 
505 8 |a 15 Privacy and Authentication: An Introduction to Cryptography -- Whitfield Diffie and Martin E. Hellman -- Abstract -- 15.1 Introduction -- 15.2 Cryptographic Fundamentals -- 15.3 Examples of Systems and Solutions -- 15.4 Cryptographic Taxonomy -- 15.5 Cryptography in Practice -- 15.6 Applications of Cryptography -- 15.7 Selected Bibliography -- References -- Contributors 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
650 0 |a Cryptography. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Slayton, Rebecca,  |e editor. 
776 0 8 |i Print version:  |z 9781450398275  |z 9781450398251 
830 0 |a ACM books ;  |v #42. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://dl.acm.org/doi/book/10.1145/3549993 
992 |c EBOOK-TN  |c ACM 
999 |c 108507  |d 108507 
993 |x NEPOSILAT  |y EIZ