-
1
-
-
84937998146
-
-
March 17
-
Federal Register, March 17, 1975, Vol. 40, No. 52.
-
(1975)
Federal Register
, vol.40
, Issue.52
-
-
-
2
-
-
84937996936
-
-
August 1
-
Federal Register, August 1, 1975, Vol. 40, No. 149.
-
(1975)
Federal Register
, vol.40
, pp. 149
-
-
-
3
-
-
84938013136
-
Preliminary Remarks on the National Bureau of Standards Proposed Standard Encryption Algorithm for Computer Data Protection
-
sent to NBS, May
-
W. Diffie, “Preliminary Remarks on the National Bureau of Standards Proposed Standard Encryption Algorithm for Computer Data Protection,” sent to NBS, May 22, 1975.
-
(1975)
-
-
Diffie, W.1
-
4
-
-
84937994033
-
-
letter to Dennis Branstad at NBS, dated October
-
M. Hellman, letter to Dennis Branstad at NBS, dated October 22, 1975.
-
(1975)
-
-
Hellman, M.1
-
5
-
-
84914777726
-
Encryption Algorithm: Key Size is the Thing
-
March
-
E. K. Yasaki, “Encryption Algorithm: Key Size is the Thing,” Datamation, March 1976, pp. 164–166.
-
(1976)
Datamation
, pp. 164-166
-
-
Yasaki, E.K.1
-
7
-
-
84938004425
-
-
letter to M. Hellman dated January 6
-
S. Jeffery (NBS), letter to M. Hellman dated January 6, 1976.
-
(1976)
-
-
Jeffery, S.1
-
9
-
-
0016506999
-
Physical Limits in Digital Electronics
-
May
-
R. W. Keyes, “Physical Limits in Digital Electronics,” Proceedings of the IEEE, Vol. 63, May 1975, pp. 740–767.
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 740-767
-
-
Keyes, R.W.1
-
10
-
-
84939371967
-
Report of the 1976 Workshop on Estimation of Significant Advances in Computer Technology
-
August 30–31
-
National Bureau of Standards, “Report of the 1976 Workshop on Estimation of Significant Advances in Computer Technology,” August 30–31, 1976.
-
(1976)
-
-
-
11
-
-
0042416526
-
Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard
-
Information Systems Laboratory Report, Stanford University, November 10, (Available from NTIS.)
-
M. Hellman, R. Merkle, R. Schroeppel, L. Washington, W. Diffie, S. Pohlig, and P. Schweitzer, “Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard,” Information Systems Laboratory Report, Stanford University, November 10, 1976. (Available from NTIS.)
-
(1976)
-
-
Hellman, M.1
Merkle, R.2
Schroeppel, R.3
Washington, L.4
Diffie, W.5
Pohlig, S.6
Schweitzer, P.7
-
12
-
-
84938016249
-
Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard
-
Bell Telephone Laboratories memorandum, December also to appear Cryptologia
-
R. Morris, N. J. A. Sloane, and A. D. Wyner, “Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard,” Bell Telephone Laboratories memorandum, December 1976; also to appear Cryptologia.
-
(1976)
-
-
Morris, R.1
Sloane, N.J.A.2
Wyner, A.D.3
-
13
-
-
84938018705
-
-
NBS memo to Dr. Dennis Branstad. Subject: Stanford University letter on length of key needed for NBS encryption algorithm. Dated November 4
-
D. Grubb, NBS memo to Dr. Dennis Branstad. Subject: Stanford University letter on length of key needed for NBS encryption algorithm. Dated November 4, 1975.
-
(1975)
-
-
Grubb, D.1
-
14
-
-
84938020423
-
-
NBS letter to the Hon. Charles A. Mosher (U.S. House of Representatives) dated March 30
-
R. Davis, NBS letter to the Hon. Charles A. Mosher (U.S. House of Representatives) dated March 30, 1975.
-
(1975)
-
-
Davis, R.1
-
15
-
-
84938019619
-
Microprocessor Technology: Yesterday, Today and Tomorrow
-
November 20
-
F. Faggin, “Microprocessor Technology: Yesterday, Today and Tomorrow,” EDN, November 20, 1975.
-
(1975)
EDN
-
-
Faggin, F.1
-
16
-
-
84936903533
-
The Role of Technology in Microcomputer Design and Evolution
-
February
-
F. Faggin, “The Role of Technology in Microcomputer Design and Evolution,” IEEE Trans. on Circuits and Systems, Vol. 7, No. 5, February 1975, pp. 4–13.
-
(1975)
IEEE Trans. on Circuits and Systems
, vol.7
, Issue.5
, pp. 4-13
-
-
Faggin, F.1
-
18
-
-
84890522850
-
The Communication Theory of Secrecy Systems
-
C. Shannon, “The Communication Theory of Secrecy Systems,” BSTJ, Vol. 28, pp. 656–715, 1949.
-
(1949)
BSTJ
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
19
-
-
0017495002
-
An Extension of the Shannon Theory Approach to Cryptography
-
May
-
H. Hellman, “An Extension of the Shannon Theory Approach to Cryptography,” IEEE Trans. on Information Theory, Vol. IT-23, May 1977, pp. 289–294.
-
(1977)
IEEE Trans. on Information Theory
, vol.IT-23
, pp. 289-294
-
-
Hellman, H.1
|