-
2
-
-
85084882803
-
Slow growing encryption market to spurt in '80‘s
-
January
-
H. P. Burstyn, “Slow growing encryption market to spurt in '80‘s,” Electronic Business (January 1979), pp. 76-77.
-
(1979)
Electronic Business
, pp. 76-77
-
-
Burstyn, H.P.1
-
3
-
-
0040030793
-
A simple and effective public key cryptosystem
-
Spring, This paper was published without review outside Comsat and immediately exposed as a rediscovery of a system considered by Rivest, Shamir, and Adleman and rejected as weak. Their analysis appears in: R. Rivest and L. Adleman, “How to break the Lu-Lee cryptosystem,” to appear, Computer Security Journal
-
S. Lu and L. Lee, “A simple and effective public key cryptosystem,” Comsat Technical Review, Vol. 9, No. 1 (Spring 1979). This paper was published without review outside Comsat and immediately exposed as a rediscovery of a system considered by Rivest, Shamir, and Adleman and rejected as weak. Their analysis appears in: R. Rivest and L. Adleman, “How to break the Lu-Lee cryptosystem,” to appear, Computer Security Journal.
-
(1979)
Comsat Technical Review
, vol.9
, Issue.1
-
-
Lu, S.1
Lee, L.2
-
4
-
-
85084894821
-
Data encryption standard
-
National Bureau of Standards (Jan. 15
-
“Data encryption standard,” Federal Information Standards Publication U6. National Bureau of Standards (Jan. 15, 1977).
-
(1977)
Federal Information Standards Publication U6
-
-
-
6
-
-
0017018484
-
New directions in cryptography
-
Nov, (See pp. 143-180, this volume)
-
W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Trans, on Inform. Theory. IT-22, No. 6 (Nov. 1976), pp. 644-654. (See pp. 143-180, this volume)
-
(1976)
IEEE Trans, on Inform. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
7
-
-
0017501281
-
Exhaustive cryptanalysis of the NBS data encryption standard
-
June
-
W. Diffie and M. E. Hellman, “Exhaustive cryptanalysis of the NBS data encryption standard,” Computer, Vol. 10, No. 6 (June 1977), pp. 74-84.
-
(1977)
Computer
, vol.10
, Issue.6
, pp. 74-84
-
-
Diffie, W.1
Hellman, M.E.2
-
9
-
-
85084875762
-
NEC systems recognize and speaker’s words
-
June
-
“NEC systems recognize and speaker’s words,” Electronics, 19 (June 1980), pp. 69-70.
-
(1980)
Electronics
, vol.19
, pp. 69-70
-
-
-
10
-
-
85084908984
-
Typewriters with ears, words with pix
-
Sept. 15
-
“Typewriters with ears, words with pix,” Electronic Mail and Message Systems, Vol. 4, No. 18 (Sept. 15, 1980).
-
(1980)
Electronic Mail and Message Systems
, vol.4
, Issue.18
-
-
-
11
-
-
85084863847
-
-
(March
-
International Resource Development, “Data and voice encryption,” (March 1979), p. 62.
-
(1979)
Data and voice encryption
, pp. 62
-
-
-
12
-
-
85084896793
-
Revision of the international tariff in arms regulations
-
45-FR-83970-95 (Dec. 19
-
“Revision of the international tariff in arms regulations,” Federal Register. 45-FR-83970-95 (Dec. 19, 1980).
-
(1980)
Federal Register
-
-
-
14
-
-
85084871152
-
Unscrambling the encryption market
-
Quantum Science Corporation, Mar. 31
-
“Unscrambling the encryption market,” Quantum Science Corporation, MAPTEK Brief, Vol. 78, No. 424 (Mar. 31, 1978).
-
(1978)
MAPTEK Brief
, vol.78
, Issue.424
-
-
-
15
-
-
0018019325
-
Hiding information and signatures in trapdoor knapsacks
-
Sept, (See pp. 197-215, this volume.)
-
R. C. Merkle and M. E. Hellman, “Hiding information and signatures in trapdoor knapsacks,” IEEE Trans, on Inform. Theory, IT-24, No. 5 (Sept. 1978), pp. 525-530. (See pp. 197-215, this volume.)
-
(1978)
IEEE Trans, on Inform. Theory
, vol.IT-24
, Issue.5
, pp. 525-530
-
-
Merkle, R.C.1
Hellman, M.E.2
-
16
-
-
84909540601
-
A data link encryption system
-
Washington, D.C. (Nov. 27-29
-
F. H. Myers, “A data link encryption system,” National Telecommunications Conference, Washington, D.C. (Nov. 27-29, 1979).
-
(1979)
National Telecommunications Conference
-
-
Myers, F.H.1
-
18
-
-
85084876306
-
-
by Howard Morland was finally published in The. Progressive for November 1979- Most of this issue and the May, “Born secret,” issue of The Progressive are devoted to explaining the legal battle
-
The article, “The H-bomb secret, how we got it - why we’re telling it,” by Howard Morland was finally published in The. Progressive for November 1979- Most of this issue and the May 1979, “Born secret,” issue of The Progressive are devoted to explaining the legal battle.
-
(1979)
The H-bomb secret, how we got it - why we’re telling it
-
-
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosys-tems
-
Feb, (See pp. 217-239, this volume.)
-
R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosys-tems,” Communications of the ACM. Vol. 21, No. 2 (Feb. 1978), pp. 120-126. (See pp. 217-239, this volume.)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
20
-
-
85084890099
-
Data encryption with public key distribution
-
Washington, D.C. (Oct. 9-11
-
B. P. Shanning, “Data encryption with public key distribution,” LEEE EASC0N’79. Washington, D.C. (Oct. 9-11, 1979).
-
(1979)
LEEE EASC0N’79
-
-
Shanning, B.P.1
-
21
-
-
84947571309
-
Message authentication without secrecy: A secure communications problem uniquely solvable by asymmetric encryption techniques
-
IEEE EASC0N’79, Washington, D.C. (Oct. 9-11
-
G. J. Simmons, “Message authentication without secrecy: a secure communications problem uniquely solvable by asymmetric encryption techniques,” IEEE EASC0N’79, Washington, D.C. (Oct. 9-11, 1979), EASC0N’79 Record, pp. 661-662.
-
(1979)
EASC0N’79 Record
, pp. 661-662
-
-
Simmons, G.J.1
-
22
-
-
84909529528
-
Words into action I
-
June
-
G. Kaplan, “Words into action I,” IEEE Spectrum. Vol. 17, No. 6 (June 1980), pp. 22-25
-
(1980)
IEEE Spectrum
, vol.17
, Issue.6
, pp. 22-25
-
-
Kaplan, G.1
-
23
-
-
18944387627
-
Words into action II
-
June
-
R. Reddi, “Words into action II,” IEEE Spectrum, Vol. 17, No. 6 (June 1980), pp. 26-28
-
(1980)
IEEE Spectrum
, vol.17
, Issue.6
, pp. 26-28
-
-
Reddi, R.1
-
24
-
-
33744625928
-
Words into action III
-
June
-
Y. Kato, “Words into action III,” IEEE Spectrum, Vol. 17, No. 6 (June 1980), p. 29.
-
(1980)
IEEE Spectrum
, vol.17
, Issue.6
, pp. 29
-
-
Kato, Y.1
-
25
-
-
0347379574
-
Science meetings catch U.S. - Soviet chill
-
Mar. 7
-
N. Wade, “Science meetings catch U.S. - Soviet chill,” Science (Mar. 7, 1980), p. 1056.
-
(1980)
Science
, pp. 1056
-
-
Wade, N.1
-
26
-
-
0018467416
-
An analog scrambling scheme which does not expand bandwidth part I: Discrete time
-
May
-
A. D. Wyner, “An analog scrambling scheme which does not expand bandwidth part I: discrete time,” IEEE Trans. on Inform. Theory. IT-25, No. 3 (May 1979), pp. 26l-274.
-
(1979)
IEEE Trans. on Inform. Theory.
, vol.IT-25
, Issue.3
, pp. 26l-274
-
-
Wyner, A.D.1
-
27
-
-
0018491931
-
An analog scrambling scheme which does not expand bandwidth, part II: Continuous time
-
July
-
A. D. Wyner, “An analog scrambling scheme which does not expand bandwidth, part II: continuous time,” lKKE Trans, on Inform. Theory, IT-25, No. 4 (July 1979), pp. 415-424.
-
(1979)
lKKE Trans, on Inform. Theory
, vol.IT-25
, Issue.4
, pp. 415-424
-
-
Wyner, A.D.1
|