WorldCat Identities

Diffie, Whitfield

Overview
Works: 31 works in 128 publications in 2 languages and 6,022 library holdings
Genres: History 
Roles: Author, Editor, Author of introduction, Other, Signer, Creator
Classifications: KF9670, 342.730858
Publication Timeline
.
Most widely held works about Whitfield Diffie
 
Most widely held works by Whitfield Diffie
Privacy on the line : the politics of wiretapping and encryption by Whitfield Diffie( )

61 editions published between 1998 and 2019 in English and Undetermined and held by 4,521 WorldCat member libraries worldwide

Diffie and Landau examine the national-security, law-enforcement, commercial, and civil-liberties issues. They discuss privacy's social function, how it underlies a democratic society, and what happens when it is lost. They also explore how intelligence and law-enforcement organizations work, how they intercept communications, and how they use what they intercept
Cracking codes : the Rosetta stone and decipherment by R. B Parkinson( Book )

14 editions published in 1999 in English and held by 854 WorldCat member libraries worldwide

"The Rosetta Stone has become an instantly recognizable icon of script and decipherment and is one of the most famous Egyptian antiquities in the world. Discovered by Napoleon's troops at the village of Rosetta in the western Delta in 1799, the granitoid slab is a fragment of a stela inscribed with a priestly decree in honour of Ptolemy V. The main significance of the text lies not in its content, however, but in the fact that it is written in three scripts: hieroglyphic, demotic and ancient Greek." "Richard Parkinson here tells the story of the Stone's discovery and the so-called battle of the decipherers which it inspired."--BOOK JACKET
Breaking teleprinter ciphers at Bletchley Park : general report on Tunny with emphasis on statistical methods (1945) by Irving John Good( )

16 editions published between 2012 and 2015 in English and held by 372 WorldCat member libraries worldwide

This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit in the GRT. Explores the likely roots of the ideas entering into the Tunny cryptanalysis. Includes examples of original worksheets, and printouts of the Tunny-breaking process in action. Presents additional commentary, biographies, glossaries, essays, and bibliographies
Privacy on the Line by Whitfield Diffie( )

5 editions published between 1998 and 2010 in English and Undetermined and held by 235 WorldCat member libraries worldwide

A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world.Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population.In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy
Applied cryptography : protocols, algorithms, and source code in C by Bruce Schneier( Book )

2 editions published in 2015 in English and held by 8 WorldCat member libraries worldwide

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover
Stanford LISP 1.6 manual by L Quam( Book )

3 editions published between 1970 and 1978 in English and Undetermined and held by 4 WorldCat member libraries worldwide

Privacy on the line the politics of wiretapping and encryption by Whitfield Diffie( )

1 edition published in 2007 in English and held by 2 WorldCat member libraries worldwide

Cryptanalysis of the NBS Data Encryption Standard( Book )

1 edition published in 1976 in English and held by 2 WorldCat member libraries worldwide

Porto Rico : a broken pledge by Whitfield Diffie( Book )

1 edition published in 1931 in English and held by 2 WorldCat member libraries worldwide

Privacy and authentication : an introduction to Cryptography by Whitfield Diffie( )

2 editions published in 1979 in English and held by 2 WorldCat member libraries worldwide

Schriftwesen ; Chiffriermaschine, Dechiffriermaschine
System security 30.3. - 3.4.92 by Thomas Beth( Book )

2 editions published in 1992 in English and held by 2 WorldCat member libraries worldwide

Results of an initial attempt to cryptanalyze the NBS data encryption standard by Stanford University( Book )

1 edition published in 1976 in English and held by 1 WorldCat member library worldwide

The first ten years of public-key cryptography by Whitfield Diffie( )

1 edition published in 1988 in English and held by 1 WorldCat member library worldwide

Exhaustive cryptanalysis of the NBS data encryption standars by Whitfield Diffie( )

1 edition published in 1977 in English and held by 1 WorldCat member library worldwide

Nowy, wspaniały świat inwigilacji : podsłuch w Internecie by Whitfield Diffie( )

1 edition published in 2008 in Polish and held by 1 WorldCat member library worldwide

The first ten years of public-key cryptography by Whitfield Diffie( Book )

1 edition published in 1988 in English and held by 1 WorldCat member library worldwide

Cryptopolitics by Whitfield Diffie( Visual )

1 edition published in 1998 in English and held by 1 WorldCat member library worldwide

Diffie discusses network security
Latin-American civilization : colonial period by Bailey W Diffie( Book )

1 edition published in 1947 in English and held by 1 WorldCat member library worldwide

Cryptographic technology: fifteen year forecast by Whitfield Diffie( Book )

1 edition published in 1981 in Undetermined and held by 1 WorldCat member library worldwide

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists( )

1 edition published in 1996 in English and held by 1 WorldCat member library worldwide

Encryption plays an essential role in protecting the privacy of electronic information against threats from a variety of potential attackers. In so doing, modern cryptography employs a combination of conventional or symmetric cryptographic systems for encrypting data and public key or asymmetric systems for managing the keys used by symmetric systems. Assessing the strength required of the symmetric cryptographic systems is therefore an essential step in employing cryptography for computer and communication security
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.22 (from 0.12 for The first ... to 0.99 for Porto Rico ...)

Privacy on the line : the politics of wiretapping and encryption
Covers
Cracking codes : the Rosetta stone and deciphermentPrivacy on the LineApplied cryptography : protocols, algorithms, and source code in C
Alternative Names
Diffie, Bailey Whitfield.

Diffie, W.

Diffie, W. 1944-

Diffie, W. (Whitfield)

Diffie, Whit.

Diffie, Whit 1944-

Diffie, Whittfield 1944-

Whitfield Diffie American cryptographer

Whitfield Diffie americký informatik

Whitfield Diffie Amerikaans cryptograaf

Whitfield Diffie amerikai titkosírás szakértő (kriptográfus), 1944-

Whitfield Diffie amerikanischer Experte für Kryptographie

Whitfield Diffie crittografo statunitense

Whitfield Diffie cryptographe américain

Γουίτφιλντ Ντίφι Αμερικανός κρυπτογράφος

Витфилд Дифи

Вітфілд Діффі

Диффи, Уитфилд

Уитфилд Диффи

ויטפילד דיפי

ويتفيلد ديفى

ويتفيلد ديفي

ویتفیلد دیفی

হুইটফিল্ড ডিফি

হুইটফিল্ড ডিফি মার্কিন কম্পিউটার বিজ্ঞানী

விட்பீல்டு டிஃபீ

휫필드 디피

ホイットフィールド・ディフィー

惠特菲爾德·迪菲

惠特菲爾德·迪菲 美國密碼學家

Languages
English (113)

Polish (1)