WorldCat Identities

Diffie, Whitfield

Overview
Works: 25 works in 86 publications in 1 language and 5,284 library holdings
Genres: History 
Roles: Author, Editor, Other, Signer, Author of introduction
Classifications: KF9670, 342.730858
Publication Timeline
.
Most widely held works about Whitfield Diffie
 
Most widely held works by Whitfield Diffie
Privacy on the line : the politics of wiretapping and encryption by Whitfield Diffie( Book )

41 editions published between 1998 and 2010 in English and held by 1,879 WorldCat member libraries worldwide

Diffie and Landau examine the national-security, law-enforcement, commercial, and civil-liberties issues. They discuss privacy's social function, how it underlies a democratic society, and what happens when it is lost. They also explore how intelligence and law-enforcement organizations work, how they intercept communications, and how they use what they intercept
Cracking codes : the Rosetta stone and decipherment by R. B Parkinson( Book )

14 editions published in 1999 in English and held by 873 WorldCat member libraries worldwide

Deciphering the Rosetta Stone -- Reading a text: the Egyptian scripts of the Rosetta Stone -- Towards reading a cultural code: the uses of writing in ancient Egypt -- The future: futher codes to crack
Breaking teleprinter ciphers at Bletchley Park : general report on Tunny with emphasis on statistical methods (1945) by Irving John Good( Book )

3 editions published in 2015 in English and held by 16 WorldCat member libraries worldwide

This detailed technical account of breaking Tunny is an edition of a report written in 1945, with extensive modern commentary Breaking Teleprinter Ciphers at Bletchley Park gives the full text of the General Report on Tunny (GRT) of 1945, making clear how the ideas, notation and the specially designed machines that were used differ from what was generally accepted in 1945, and, where a modern reader might be misled, from what is understood now. The editors of this book clarify the sometimes slightly strange language of the GRT and explain the text within a variety of contexts in several separate historical story lines, some only implicit in the GRT itself. The first story, told by the authors of the GRT, describes how, using specially designed machines, including from 1944 the "Colossus", the British broke the enciphered teleprinter messages sent by the highest command levels of the Germany Army. The cipher machines the Germans used were the Lorenz SZ 40 series, called "Tunny" by the British. The second story shows how the use of then-unfashionable Bayesian methods in statistics proved to be essential to the British success. The third story describes a significant stage in the invention of the modern digital computer. This story is connected with Alan Turing's 1936 paper on the theory of computability, which is nowadays seen as a starting point for the development of the modern digital computer. This book includes: . Over 200 pages of commentary, biographies, glossaries, and essays related to the text of the General Report on Tunny. The complete text of the original GRT, covering the general theory of Tunny breaking and of numerous refinements appropriate to special-case situations. All the examples of original worksheets and printouts, showing the Tunny-breaking process in action, that appear in the GRT The main purpose of this book is to present the actual words of the GRT for use by readers with a serious interest in the history of cryptography, computing, or mathematics
Stanford LISP 1.6 manual by Lynn Herman Quam( Book )

2 editions published between 1970 and 1975 in Undetermined and English and held by 3 WorldCat member libraries worldwide

Cryptopolitics by Whitfield Diffie( Visual )

1 edition published in 1998 in English and held by 2 WorldCat member libraries worldwide

Diffie discusses network security
Latin-American civilization : colonial period by Bailey W Diffie( Book )

2 editions published between 1947 and 1967 in English and held by 2 WorldCat member libraries worldwide

Privacy and authentication : An introduction to Cryptography by Whitfield Diffie( )

2 editions published in 1979 in English and held by 2 WorldCat member libraries worldwide

Schriftwesen ; Chiffriermaschine, Dechiffriermaschine
"Breaking Teleprinter Ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms: General Report on Tunny with Emphasis on Statistical Methods (1945)" by J Reeds( Book )

3 editions published in 2015 in English and Undetermined and held by 1 WorldCat member library worldwide

This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit in the GRT. Explores the likely roots of the ideas entering into the Tunny cryptanalysis. Includes examples of original worksheets, and printouts of the Tunny-breaking process in action. Presents additional commentary, biographies, glossaries, essays, and bibliographies
Cryptographic technology: fifteen year forecast by Whitfield Diffie( Book )

1 edition published in 1981 in Undetermined and held by 1 WorldCat member library worldwide

The first ten years of public-key cryptography by Whitfield Diffie( )

1 edition published in 1988 in English and held by 1 WorldCat member library worldwide

Privacy on the Line by Whitfield Diffie( Book )

1 edition published in 1998 in English and held by 1 WorldCat member library worldwide

Results of an initial attempt to cryptanalyze the NBS data encryption standard by Stanford University( Book )

1 edition published in 1976 in English and held by 1 WorldCat member library worldwide

The first ten years of public-key cryptography by Whitfield Diffie( Book )

1 edition published in 1988 in English and held by 1 WorldCat member library worldwide

Applied cryptography, second edition : protocols, algorithms, and source code in C by Bruce Schneier( Book )

1 edition published in 2015 in English and held by 1 WorldCat member library worldwide

"This special Anniversary Edition celebrates 20 years for the most definitive reference on cryptography ever published." -- Book jacket. New introduction by the author
Porto Rico: a broken pledge by Bailey W Diffie( Book )

1 edition published in 1931 in English and held by 1 WorldCat member library worldwide

System security : Dagstuhl, 30.03-03.04.1992 by Thomas Beth( Book )

1 edition published in 1992 in English and held by 1 WorldCat member library worldwide

Exhaustive cryptanalysis of the NBS data encryption standars by Whitfield Diffie( )

1 edition published in 1977 in English and held by 1 WorldCat member library worldwide

Who holds the keys? cryptography & control : national security vs. personal privacy( Visual )

1 edition published in 1992 in English and held by 1 WorldCat member library worldwide

Videotaped session from the Second Conference on Computers, Freedom & Privacy, March 18-20, 1992, Washington, D.C
Breaking Teleprinter Ciphers at Bletchley Park General Report on Tunny with Emphasis on Statistical Methods (1945) by James A Reeds( )

2 editions published in 2015 in English and held by 0 WorldCat member libraries worldwide

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists( )

1 edition published in 1996 in English and held by 0 WorldCat member libraries worldwide

Encryption plays an essential role in protecting the privacy of electronic information against threats from a variety of potential attackers. In so doing, modern cryptography employs a combination of conventional or symmetric cryptographic systems for encrypting data and public key or asymmetric systems for managing the keys used by symmetric systems. Assessing the strength required of the symmetric cryptographic systems is therefore an essential step in employing cryptography for computer and communication security
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.24 (from 0.13 for The first ... to 1.00 for Minimal Ke ...)

Privacy on the line : the politics of wiretapping and encryption
Alternative Names
Diffie, Bailey Whitfield.

Diffie, W.

Diffie, W. 1944-

Diffie, W. (Whitfield)

Diffie, Whit.

Diffie, Whittfield 1944-

Whitfield Diffie Amerikaans cryptograaf

Whitfield Diffie amerikanischer Experte für Kryptographie

Whitfield Diffie crittografo statunitense

Whitfield Diffie cryptographe américain

Диффи, Уитфилд

ויטפילד דיפי

ويتفيلد ديفي

ویتفیلد دیفی

হুইটফিল্ড ডিফি

விட்பீல்டு டிஃபீ

휫필드 디피

ホイットフィールド・ディフィー

惠特菲爾德·迪菲

Languages
English (79)

Covers
Cracking codes : the Rosetta stone and decipherment