Online citations, reference lists, and bibliographies.
← Back to Search

New Directions In Cryptography

W. Diffie, M. Hellman
Published 1976 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper suggests ways to solve these currently open problems. It also discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
This paper references
I31
10.1145/1499799.1499815
Multiuser cryptographic techniques
W. Diffie (1976)
Cryptanalysis of the NBS data encryption standard " submitted to Computer, ing and Searching
M E Diffie (1973)
An improved algorithm for computing algorithms in GF(p) and its cryptographic significance
S Pohlig
10.1109/TIT.1977.1055709
An extension of the Shannon theory approach to cryptography
M. Hellman (1977)
10.2307/1853680
The codebreakers : the story of secret writing
D. Kahn (1968)
10.1145/361082.361087
A user authentication scheme not requiring secrecy in the computer
A. Evans (1974)
Communication theory of secrecy sysenough to resist a known plaintext cryptanalytic attack, thereby tems
C. E. Shannon (1949)
The Design for computing algorithms in GF(p) and its cryptographic significance
A V Aho (1974)
The Art of Computer Programming 2 / Seminumerical Algorithms
D. Knuth (1971)
Secure communication over an insecure channel
R Merkle
10.1145/361082.361089
A high security log-in procedure
G. Purdy (1974)
A user authentication system not requiring secrecy in the com- Miller and J. Thatcher, Eds. New York: Plenum, 1972, pp. 85–104. puter
M. E. Hellman (1974)
10.1002/J.1538-7305.1949.TB00928.X
Communication theory of secrecy systems
C. Shannon (1949)
Multiuser cryptographic techniques, " presented at National Computer Conference
W Diffie (1976)
An improved algorithm
S Pohlig (1976)
The art of computer programming: sorting and searching (volume 3)
D. Knuth (1973)
The Design and Analysis of Computer Algorithms
A. Aho (1974)
10.1109/C-M.1977.217750
Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard
W. Diffie (1977)
A user authentication system not requiring secrecy in the com- Miller and
A Evans (1972)
Communication of the ACM
Puter (1974)
10.1007/978-1-4684-2001-2
Complexity of Computer Computations
R. Miller (1972)
The Art of Computer Programming
D. E. Knuth (1968)



This paper is referenced by
Cryptography in Embedded Systems : An Overview
T. Wollinger (2003)
Protecting communications against forgery
D. J. Bernstein (2008)
STUDIES ON HIGH-SPEED HARDWARE IMPLEMENTATION OF CRYPTOGRAPHIC ALGORITHMS
K. Järvinen (2008)
A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem
(2020)
10.1145/1806689.1806715
Public-key cryptography from different assumptions
B. Applebaum (2010)
Generic Construction of Audit Logging Schemes with Forward Privacy and Authenticity
M. Mihaljevic (2016)
10.1007/978-1-4684-4730-9
Advances in Cryptology
D. Chaum (1983)
Birthday attack to discrete logarithm
A. Li (2007)
10.1016/j.ins.2007.05.039
A provably secure short signature scheme based on discrete logarithms
Zuhua Shao (2007)
10.1016/j.adhoc.2006.05.003
Threshold password authentication against guessing attacks in Ad hoc networks
Zhenchuan Chai (2007)
10.1007/s11277-006-9176-9
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment
I. Lin (2007)
10.1007/978-3-540-74827-4_27
Improvement of an Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems
Chen Dong (2007)
A Comparison of the Standardized Versions of ECIES
V. Gayoso (2010)
10.5220/0002917904110416
Conjugation as public key agreement protocol in mobile cryptography
Vittorio Ottaviani (2010)
Implementing Elliptic Curve Cryptography
L. Deligiannidis (2015)
On the Efficiency of Pollard's Rho Method for Discrete Logarithms
S. Bai (2008)
10.1007/978-0-387-87969-7_11
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
Kim-Kwang Raymond Choo (2007)
INSTITUTO POLIT ECNICO NACIONAL ESCUELA SUPERIOR DE F ISICA Y
Matem Aticas (2008)
New ID-based Fair Blind Signatures
Girraj Kumar Verma (2008)
Simulations of modular multipliers on FPGA
Y. Kong (2007)
10.1007/3-540-45678-3_19
Generic Algorithms and Key Agreement Protocols Based on Group Actions
A. Yamamura (2001)
Assessing Disease Exposure Risk With Location Histories And Protecting Privacy: A Cryptographic Approach In Response To A Global Pandemic
Alex Berke (2020)
ELLIPTIC CURVE CRYPTOGRAPHY. JAVA PLATFORM IMPLEMENTATIONS
V. Martínez (2009)
Security enhanced agent systems
Qi Zhang (2009)
10.5762/KAIS.2009.10.2.388
Three-Party Key Exchange Protocol Providing User Anonymity based on Smartcards
Jong-Seok Choi (2009)
10.1016/j.csi.2008.05.014
A novel access control protocol for secure sensor networks
Hui-Feng Huang (2009)
10.1016/J.CHAOS.2007.06.030
Chaotic map based key agreement with/out clock synchronization
Song Han (2009)
10.1016/j.ins.2008.10.004
An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation
Chia-Long Wu (2009)
10.1109/IAS.2009.183
Certificateless One-Way Authenticated Two-Party Key Agreement Protocol
Wuping Chen (2009)
10.5755/J01.ITC.39.3.12374
IMPROVED THREE PARTY EKE PROTOCOL
R. Padmavathy (2010)
10.1109/ETCS.2010.515
Research on DRM in the Remote Public Security Business Information System Application
Wu Chun-ying (2010)
10.1109/ICC.2010.5502141
A Permutation-Based Multi-Polynomial Scheme for Pairwise Key Establishment in Sensor Networks
S. Guo (2010)
See more
Semantic Scholar Logo Some data provided by SemanticScholar