• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

New directions in cryptography. (1976)

Cached

Download Links

  • [www.five-fingers.es]
  • [courses.cs.vt.edu]
  • [courses.csail.mit.edu]
  • [courses.csail.mit.edu]
  • [www.cs.rutgers.edu]
  • [www.cs.utsa.edu]
  • [www.cs.rutgers.edu]
  • [www.wisdom.weizmann.ac.il]
  • [www.lsi.upc.edu]
  • [crypto.csail.mit.edu]
  • [securespeech.cs.cmu.edu]
  • [groups.csail.mit.edu]
  • [www.cs.jhu.edu]
  • [www.cs.brown.edu]
  • [www.cs.cmu.edu]
  • [dm.ing.unibs.it]
  • [www.cs.tau.ac.il]
  • [www-lsi.upc.es]
  • [cr.yp.to]
  • [www.cs.virginia.edu]
  • [www.cs.utexas.edu]
  • [www.cs.utexas.edu]
  • [www.cs.jhu.edu]
  • [www.cs.utexas.edu]
  • [www.lsi.upc.es]
  • [www.cs.utexas.edu]
  • [www.cs.berkeley.edu]
  • [www.cs.virginia.edu]
  • [www.eecs.berkeley.edu]
  • [www.cs.toronto.edu]
  • [www.cs.utexas.edu]
  • [people.csail.mit.edu]
  • [www.cs.utexas.edu]
  • [www.cs.rutgers.edu]
  • [www.cs.rutgers.edu]
  • [www.cs.toronto.edu]
  • [www.cs.berkeley.edu]
  • [www.cs.virginia.edu]
  • [www.cs.utexas.edu]
  • [www.cs.utexas.edu]
  • [www.cs.utexas.edu]
  • [www.cs.utexas.edu]
  • [cs.unc.edu]
  • [web.mit.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Whitfield Diffie , Martin E Hellman
Venue:IEEE Trans. Inf. Theory,
Citations:3515 - 7 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@ARTICLE{Diffie76newdirections,
    author = {Whitfield Diffie and Martin E Hellman},
    title = {New directions in cryptography.},
    journal = {IEEE Trans. Inf. Theory,},
    year = {1976}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Abstract Two kinds of contemporary developments in cryp-communications over an insecure channel order to use cryptogtography are examined. Widening applications of teleprocess-raphy to insure privacy, however, it currently necessary for the ing have given rise to a need for new types of cryptographic communicating parties to share a key which is known to no systems, which minimize the need for secure key distribution one else. This is done by sending the key in advance over some channels and supply the equivalent of a written signature. This secure channel such a private courier or registered mail. A paper suggests ways to solve these currently open problems. private conversation between two people with no prior acquainIt also discusses how the theories of communication and compu-tance is a common occurrence in business, however, and it is tation are beginning to provide the tools to solve cryptographic unrealistic to expect initial business contacts to be postponed problems of long standing. long enough for keys to be transmitted by some physical means. The cost and delay imposed by this key distribution problem is a major barrier to the transfer of business communications

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University