My Account Log in

1 option

Democratizing Cryptography/ The Work of Whiteld Diffie and Martin Hellman/ Rebecca Slayton.

ACM Book collection II Available online

ACM Book collection II
Format:
Book
Author/Creator:
Slayton, Rebecca, editor.
Series:
ACM books - Collection 2 ; #42.
ACM books, 2374-6777 ; #42
Language:
English
Subjects (All):
Democratizing Cryptography (Computer Science).
Genre:
Electronic books.
Physical Description:
1 online resource (xx, 538pages) LuaTEX
Edition:
First Edition
Place of Publication:
[New York, NY, USA] : Association for Computing Machinery; [2022].
System Details:
Mode of access: World Wide Web
System requirements: Adobe Acrobat Reader
Contents:
Acknowledgments
Text and Photo Credits
1 Introduction: The Early Lives and Lasting Legacies of Whitfield Diffie and Martin Hellman
Rebecca Slayton
1.1 Introduction
1.2 Early Life and Socialization
1.3 Different Paths to Cryptography
1.4 Finding an Intellectual Soul Mate
1.5 New Directions in Cryptography
1.6 Changing the World: The Chapters Ahead
References
2 Public Key Cryptography's Impact on Society: How Diffie and Hellman Changed the World
Paul C. van Oorschot
2.1 Introduction
2.2 Security Background
2.3 Context: Motivation and Environment
2.4 Inventive Contributions
2.5 Supporting and Related Developments
2.6 Major Impacts on Society
2.7 Concluding Remarks
Acknowledgments
3 Public Key Cryptography in Computer and Network Security
Paul Kocher
3.1 Symmetric Encryption and the Challenge of Scaling Communications Security
3.2 Key Management Before Public Key Cryptography
3.3 Public Key Cryptography
3.4 Digital Signatures and Certificates
3.5 Securing Internet Communications
3.6 Security Protocols
3.7 Beyond Communication
3.8 Securing Supply Chains
3.9 Protecting Software. . . and Protecting from Software
3.10 Protecting Stored Data
3.11 Securing Implementations
3.12 The Need for Aligned Interests and Transparency
3.13 The Potential Impact of Quantum Computing
3.14 The Future
4 The Influence of Public-Key Cryptography on Mathematics
Johannes Buchmann, Michael J. Jacobson, Jr., and Hugh C. Williams
4.1 Introduction
4.2 Primes
4.3 Factoring Integers
4.4 Discrete Logarithms
4.5 Elliptic Curves
4.6 Algebraic Number Fields
4.7 The Quantum Computer
4.8 Quantum-resistant Methods
4.9 Conclusion
5 A Gift that Keeps on Giving: The Impact of Public-Key Cryptography on Theoretical Computer Science
Joan Feigenbaum
5.1 Introduction
5.2 New Concepts in TCS
5.3 New Characterizations of Complexity Classes
5.4 Conclusion
6 Creating an Open Community of Cryptographers
Hilarie Orman
6.1 Introduction
6.2 Initialization
6.3 Shifting in Parallel
6.4 Expanding in New Directions with New People
6.5 Compression
6.6 Expansion
6.7 Permutation and Translation
6.8 Output
6.9 Timeline of Early Events in the Discovery of Public-key Cryptography
7 The Development of a Crypto Policy Community: Diffie-Hellman's Impact on Public Policy
Susan Landau
7.1 The Prologue
7.2 These, Our Actors
7.3 Action from an Unexpected Front: The Pentagon Papers and the White House "Plumbers"
7.4 You Can't Publish That-and Other Forms of Control
7.5 A Shift to Controlling Federal Encryption Standards
7.6 Controlling the Sale of Cryptography
7.7 The Second Crypto War
7.8 The Lasting Public Policy Legacy of Diffie and Hellman's Work
8 An Interview with Whitfield Diffie
9 An Interview with Martin Hellman
10 Information Security
11 Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic
12 New Directions in Cryptography
Whitfield Diffie and Martin E. Hellman
Abstract
12.1 Introduction
12.2 Conventional Cryptography
12.3 Public Key Cryptography
12.4 One Way Authentication
12.5 Problem Interrelations and Trap Doors
12.6 Computational Complexity
12.7 Historical Perspective
13 Exhaustive Cryptanalysis of the NBS Data Encryption Standard
13.1 Introduction
13.2 The Basic Argument
13.3 Objections to the Basic Argument
13.4 System Architecture
13.5 Chip Design
13.7 Variable Key-size Techniques
13.8 Discussion
Acknowledgment
14 An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance
Stephen C. Pohlig and Martin E. Hellman
14.1 Introduction
14.2 Use in Cryptography
14.3 An Algorithm for p = 2n + 1
14.4 An Algorithm for Arbitrary Primes
14.5 Discussion
15 Privacy and Authentication: An Introduction to Cryptography
15.1 Introduction
15.2 Cryptographic Fundamentals
15.3 Examples of Systems and Solutions
15.4 Cryptographic Taxonomy
15.5 Cryptography in Practice
15.6 Applications of Cryptography
15.7 Selected Bibliography
References
Contributors
Editor and Author Biographies
Index
Other Format:
Print version:
ISBN:
3549993
9781450398282
9781450398268
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account