WorldCat Identities

Diffie, Whitfield

Overview
Works: 27 works in 102 publications in 2 languages and 5,487 library holdings
Genres: History 
Roles: Author, Editor, Author of introduction, Other, Signer
Publication Timeline
.
Most widely held works about Whitfield Diffie
 
Most widely held works by Whitfield Diffie
Privacy on the line : the politics of wiretapping and encryption by Whitfield Diffie( )

46 editions published between 1998 and 2010 in English and Undetermined and held by 4,294 WorldCat member libraries worldwide

Diffie and Landau examine the national-security, law-enforcement, commercial, and civil-liberties issues. They discuss privacy's social function, how it underlies a democratic society, and what happens when it is lost. They also explore how intelligence and law-enforcement organizations work, how they intercept communications, and how they use what they intercept
Cracking codes : the Rosetta stone and decipherment by R. B Parkinson( Book )

15 editions published in 1999 in English and held by 856 WorldCat member libraries worldwide

Deciphering the Rosetta Stone -- Reading a text: the Egyptian scripts of the Rosetta Stone -- Towards reading a cultural code: the uses of writing in ancient Egypt -- The future: futher codes to crack
Breaking teleprinter ciphers at Bletchley Park : general report on Tunny with emphasis on statistical methods (1945) by Irving John Good( )

12 editions published between 2012 and 2015 in English and held by 300 WorldCat member libraries worldwide

This detailed technical account of breaking Tunny is an edition of a report written in 1945, with extensive modern commentary Breaking Teleprinter Ciphers at Bletchley Park gives the full text of the General Report on Tunny (GRT) of 1945, making clear how the ideas, notation and the specially designed machines that were used differ from what was generally accepted in 1945, and, where a modern reader might be misled, from what is understood now. The editors of this book clarify the sometimes slightly strange language of the GRT and explain the text within a variety of contexts in several separate historical story lines, some only implicit in the GRT itself. The first story, told by the authors of the GRT, describes how, using specially designed machines, including from 1944 the "Colossus", the British broke the enciphered teleprinter messages sent by the highest command levels of the Germany Army. The cipher machines the Germans used were the Lorenz SZ 40 series, called "Tunny" by the British. The second story shows how the use of then-unfashionable Bayesian methods in statistics proved to be essential to the British success. The third story describes a significant stage in the invention of the modern digital computer. This story is connected with Alan Turing's 1936 paper on the theory of computability, which is nowadays seen as a starting point for the development of the modern digital computer. This book includes: . Over 200 pages of commentary, biographies, glossaries, and essays related to the text of the General Report on Tunny. The complete text of the original GRT, covering the general theory of Tunny breaking and of numerous refinements appropriate to special-case situations. All the examples of original worksheets and printouts, showing the Tunny-breaking process in action, that appear in the GRT The main purpose of this book is to present the actual words of the GRT for use by readers with a serious interest in the history of cryptography, computing, or mathematics
Applied cryptography : protocols, algorithms, and source code in C by Bruce Schneier( Book )

1 edition published in 2015 in English and held by 7 WorldCat member libraries worldwide

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover
Stanford LISP 1.6 manual by Lynn Herman Quam( Book )

3 editions published between 1970 and 1978 in English and Undetermined and held by 4 WorldCat member libraries worldwide

System security : 30.3. - 3.4.92 (9214) by Thomas Beth( Book )

2 editions published in 1992 in English and held by 2 WorldCat member libraries worldwide

Porto Rico: a broken pledge by Bailey W Diffie( Book )

1 edition published in 1931 in English and held by 2 WorldCat member libraries worldwide

Latin-American civilization : colonial period by Bailey W Diffie( Book )

2 editions published between 1947 and 1967 in English and held by 2 WorldCat member libraries worldwide

Cryptopolitics by Whitfield Diffie( Visual )

1 edition published in 1998 in English and held by 2 WorldCat member libraries worldwide

Diffie discusses network security
Privacy and authentication : an introduction to Cryptography by Whitfield Diffie( )

2 editions published in 1979 in English and held by 2 WorldCat member libraries worldwide

Schriftwesen ; Chiffriermaschine, Dechiffriermaschine
Privacy on the line the politics of wiretapping and encryption by Whitfield Diffie( )

1 edition published in 2007 in English and held by 1 WorldCat member library worldwide

Privacy on the Line by Whitfield Diffie( Book )

1 edition published in 1998 in English and held by 1 WorldCat member library worldwide

Exhaustive cryptanalysis of the NBS data encryption standars by Whitfield Diffie( )

1 edition published in 1977 in English and held by 1 WorldCat member library worldwide

Cryptographic technology: fifteen year forecast by Whitfield Diffie( Book )

1 edition published in 1981 in Undetermined and held by 1 WorldCat member library worldwide

Nowy, wspaniały świat inwigilacji : podsłuch w Internecie by Whitfield Diffie( )

1 edition published in 2008 in Polish and held by 1 WorldCat member library worldwide

Who holds the keys? : cryptography & control : national security vs. personal privacy( Visual )

1 edition published in 1992 in English and held by 1 WorldCat member library worldwide

Videotaped session from the Second Conference on Computers, Freedom & Privacy, March 18-20, 1992, Washington, D.C
Results of an initial attempt to cryptanalyze the NBS data encryption standard by Stanford University( Book )

1 edition published in 1976 in English and held by 1 WorldCat member library worldwide

The first ten years of public-key cryptography by Whitfield Diffie( )

1 edition published in 1988 in English and held by 1 WorldCat member library worldwide

The first ten years of public-key cryptography by Whitfield Diffie( Book )

1 edition published in 1988 in English and held by 1 WorldCat member library worldwide

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists( )

1 edition published in 1996 in English and held by 1 WorldCat member library worldwide

Encryption plays an essential role in protecting the privacy of electronic information against threats from a variety of potential attackers. In so doing, modern cryptography employs a combination of conventional or symmetric cryptographic systems for encrypting data and public key or asymmetric systems for managing the keys used by symmetric systems. Assessing the strength required of the symmetric cryptographic systems is therefore an essential step in employing cryptography for computer and communication security
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.22 (from 0.17 for Privacy on ... to 0.99 for Nowy, wspa ...)

Privacy on the line : the politics of wiretapping and encryption
Covers
Cracking codes : the Rosetta stone and deciphermentApplied cryptography : protocols, algorithms, and source code in C
Alternative Names
Diffie, Bailey Whitfield.

Diffie, W.

Diffie, W. 1944-

Diffie, W. (Whitfield)

Diffie, Whit.

Diffie, Whit 1944-

Diffie, Whittfield 1944-

Whitfield Diffie American cryptographer

Whitfield Diffie americký informatik

Whitfield Diffie Amerikaans cryptograaf

Whitfield Diffie amerikai titkosírás szakértő (kriptográfus), 1944-

Whitfield Diffie amerikanischer Experte für Kryptographie

Whitfield Diffie crittografo statunitense

Whitfield Diffie cryptographe américain

Вітфілд Діффі

Диффи, Уитфилд

Уитфилд Диффи

ויטפילד דיפי

ويتفيلد ديفي

ویتفیلد دیفی

হুইটফিল্ড ডিফি

விட்பீல்டு டிஃபீ

휫필드 디피

ホイットフィールド・ディフィー

惠特菲爾德·迪菲

Languages
English (92)

Polish (1)