메뉴 건너뛰기




Volumn , Issue , 2019, Pages 301-327

Cryptographic technology: Fifteen-year forecast

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84939333844     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (1)

References (27)
  • 2
    • 85084882803 scopus 로고
    • Slow growing encryption market to spurt in '80‘s
    • January
    • H. P. Burstyn, “Slow growing encryption market to spurt in '80‘s,” Electronic Business (January 1979), pp. 76-77.
    • (1979) Electronic Business , pp. 76-77
    • Burstyn, H.P.1
  • 3
    • 0040030793 scopus 로고
    • A simple and effective public key cryptosystem
    • Spring, This paper was published without review outside Comsat and immediately exposed as a rediscovery of a system considered by Rivest, Shamir, and Adleman and rejected as weak. Their analysis appears in: R. Rivest and L. Adleman, “How to break the Lu-Lee cryptosystem,” to appear, Computer Security Journal
    • S. Lu and L. Lee, “A simple and effective public key cryptosystem,” Comsat Technical Review, Vol. 9, No. 1 (Spring 1979). This paper was published without review outside Comsat and immediately exposed as a rediscovery of a system considered by Rivest, Shamir, and Adleman and rejected as weak. Their analysis appears in: R. Rivest and L. Adleman, “How to break the Lu-Lee cryptosystem,” to appear, Computer Security Journal.
    • (1979) Comsat Technical Review , vol.9 , Issue.1
    • Lu, S.1    Lee, L.2
  • 4
    • 85084894821 scopus 로고
    • Data encryption standard
    • National Bureau of Standards (Jan. 15
    • “Data encryption standard,” Federal Information Standards Publication U6. National Bureau of Standards (Jan. 15, 1977).
    • (1977) Federal Information Standards Publication U6
  • 6
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov, (See pp. 143-180, this volume)
    • W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Trans, on Inform. Theory. IT-22, No. 6 (Nov. 1976), pp. 644-654. (See pp. 143-180, this volume)
    • (1976) IEEE Trans, on Inform. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 7
    • 0017501281 scopus 로고
    • Exhaustive cryptanalysis of the NBS data encryption standard
    • June
    • W. Diffie and M. E. Hellman, “Exhaustive cryptanalysis of the NBS data encryption standard,” Computer, Vol. 10, No. 6 (June 1977), pp. 74-84.
    • (1977) Computer , vol.10 , Issue.6 , pp. 74-84
    • Diffie, W.1    Hellman, M.E.2
  • 9
    • 85084875762 scopus 로고
    • NEC systems recognize and speaker’s words
    • June
    • “NEC systems recognize and speaker’s words,” Electronics, 19 (June 1980), pp. 69-70.
    • (1980) Electronics , vol.19 , pp. 69-70
  • 10
    • 85084908984 scopus 로고
    • Typewriters with ears, words with pix
    • Sept. 15
    • “Typewriters with ears, words with pix,” Electronic Mail and Message Systems, Vol. 4, No. 18 (Sept. 15, 1980).
    • (1980) Electronic Mail and Message Systems , vol.4 , Issue.18
  • 11
    • 85084863847 scopus 로고
    • (March
    • International Resource Development, “Data and voice encryption,” (March 1979), p. 62.
    • (1979) Data and voice encryption , pp. 62
  • 12
    • 85084896793 scopus 로고
    • Revision of the international tariff in arms regulations
    • 45-FR-83970-95 (Dec. 19
    • “Revision of the international tariff in arms regulations,” Federal Register. 45-FR-83970-95 (Dec. 19, 1980).
    • (1980) Federal Register
  • 14
    • 85084871152 scopus 로고
    • Unscrambling the encryption market
    • Quantum Science Corporation, Mar. 31
    • “Unscrambling the encryption market,” Quantum Science Corporation, MAPTEK Brief, Vol. 78, No. 424 (Mar. 31, 1978).
    • (1978) MAPTEK Brief , vol.78 , Issue.424
  • 15
    • 0018019325 scopus 로고
    • Hiding information and signatures in trapdoor knapsacks
    • Sept, (See pp. 197-215, this volume.)
    • R. C. Merkle and M. E. Hellman, “Hiding information and signatures in trapdoor knapsacks,” IEEE Trans, on Inform. Theory, IT-24, No. 5 (Sept. 1978), pp. 525-530. (See pp. 197-215, this volume.)
    • (1978) IEEE Trans, on Inform. Theory , vol.IT-24 , Issue.5 , pp. 525-530
    • Merkle, R.C.1    Hellman, M.E.2
  • 16
    • 84909540601 scopus 로고
    • A data link encryption system
    • Washington, D.C. (Nov. 27-29
    • F. H. Myers, “A data link encryption system,” National Telecommunications Conference, Washington, D.C. (Nov. 27-29, 1979).
    • (1979) National Telecommunications Conference
    • Myers, F.H.1
  • 18
    • 85084876306 scopus 로고
    • by Howard Morland was finally published in The. Progressive for November 1979- Most of this issue and the May, “Born secret,” issue of The Progressive are devoted to explaining the legal battle
    • The article, “The H-bomb secret, how we got it - why we’re telling it,” by Howard Morland was finally published in The. Progressive for November 1979- Most of this issue and the May 1979, “Born secret,” issue of The Progressive are devoted to explaining the legal battle.
    • (1979) The H-bomb secret, how we got it - why we’re telling it
  • 19
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosys-tems
    • Feb, (See pp. 217-239, this volume.)
    • R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosys-tems,” Communications of the ACM. Vol. 21, No. 2 (Feb. 1978), pp. 120-126. (See pp. 217-239, this volume.)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 20
    • 85084890099 scopus 로고
    • Data encryption with public key distribution
    • Washington, D.C. (Oct. 9-11
    • B. P. Shanning, “Data encryption with public key distribution,” LEEE EASC0N’79. Washington, D.C. (Oct. 9-11, 1979).
    • (1979) LEEE EASC0N’79
    • Shanning, B.P.1
  • 21
    • 84947571309 scopus 로고
    • Message authentication without secrecy: A secure communications problem uniquely solvable by asymmetric encryption techniques
    • IEEE EASC0N’79, Washington, D.C. (Oct. 9-11
    • G. J. Simmons, “Message authentication without secrecy: a secure communications problem uniquely solvable by asymmetric encryption techniques,” IEEE EASC0N’79, Washington, D.C. (Oct. 9-11, 1979), EASC0N’79 Record, pp. 661-662.
    • (1979) EASC0N’79 Record , pp. 661-662
    • Simmons, G.J.1
  • 22
    • 84909529528 scopus 로고
    • Words into action I
    • June
    • G. Kaplan, “Words into action I,” IEEE Spectrum. Vol. 17, No. 6 (June 1980), pp. 22-25
    • (1980) IEEE Spectrum , vol.17 , Issue.6 , pp. 22-25
    • Kaplan, G.1
  • 23
    • 18944387627 scopus 로고
    • Words into action II
    • June
    • R. Reddi, “Words into action II,” IEEE Spectrum, Vol. 17, No. 6 (June 1980), pp. 26-28
    • (1980) IEEE Spectrum , vol.17 , Issue.6 , pp. 26-28
    • Reddi, R.1
  • 24
    • 33744625928 scopus 로고
    • Words into action III
    • June
    • Y. Kato, “Words into action III,” IEEE Spectrum, Vol. 17, No. 6 (June 1980), p. 29.
    • (1980) IEEE Spectrum , vol.17 , Issue.6 , pp. 29
    • Kato, Y.1
  • 25
    • 0347379574 scopus 로고
    • Science meetings catch U.S. - Soviet chill
    • Mar. 7
    • N. Wade, “Science meetings catch U.S. - Soviet chill,” Science (Mar. 7, 1980), p. 1056.
    • (1980) Science , pp. 1056
    • Wade, N.1
  • 26
    • 0018467416 scopus 로고
    • An analog scrambling scheme which does not expand bandwidth part I: Discrete time
    • May
    • A. D. Wyner, “An analog scrambling scheme which does not expand bandwidth part I: discrete time,” IEEE Trans. on Inform. Theory. IT-25, No. 3 (May 1979), pp. 26l-274.
    • (1979) IEEE Trans. on Inform. Theory. , vol.IT-25 , Issue.3 , pp. 26l-274
    • Wyner, A.D.1
  • 27
    • 0018491931 scopus 로고
    • An analog scrambling scheme which does not expand bandwidth, part II: Continuous time
    • July
    • A. D. Wyner, “An analog scrambling scheme which does not expand bandwidth, part II: continuous time,” lKKE Trans, on Inform. Theory, IT-25, No. 4 (July 1979), pp. 415-424.
    • (1979) lKKE Trans, on Inform. Theory , vol.IT-25 , Issue.4 , pp. 415-424
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.