Diffie, Whitfield
Overview
Works: | 31 works in 128 publications in 2 languages and 6,022 library holdings |
---|---|
Genres: | History |
Roles: | Author, Editor, Author of introduction, Other, Signer, Creator |
Classifications: | KF9670, 342.730858 |
Publication Timeline
.
Most widely held works about
Whitfield Diffie
- An inverview with Martin Hellman by Martin Hellman( Book )
Most widely held works by
Whitfield Diffie
Privacy on the line : the politics of wiretapping and encryption by
Whitfield Diffie(
)
61 editions published between 1998 and 2019 in English and Undetermined and held by 4,521 WorldCat member libraries worldwide
Diffie and Landau examine the national-security, law-enforcement, commercial, and civil-liberties issues. They discuss privacy's social function, how it underlies a democratic society, and what happens when it is lost. They also explore how intelligence and law-enforcement organizations work, how they intercept communications, and how they use what they intercept
61 editions published between 1998 and 2019 in English and Undetermined and held by 4,521 WorldCat member libraries worldwide
Diffie and Landau examine the national-security, law-enforcement, commercial, and civil-liberties issues. They discuss privacy's social function, how it underlies a democratic society, and what happens when it is lost. They also explore how intelligence and law-enforcement organizations work, how they intercept communications, and how they use what they intercept
Cracking codes : the Rosetta stone and decipherment by
R. B Parkinson(
Book
)
14 editions published in 1999 in English and held by 854 WorldCat member libraries worldwide
"The Rosetta Stone has become an instantly recognizable icon of script and decipherment and is one of the most famous Egyptian antiquities in the world. Discovered by Napoleon's troops at the village of Rosetta in the western Delta in 1799, the granitoid slab is a fragment of a stela inscribed with a priestly decree in honour of Ptolemy V. The main significance of the text lies not in its content, however, but in the fact that it is written in three scripts: hieroglyphic, demotic and ancient Greek." "Richard Parkinson here tells the story of the Stone's discovery and the so-called battle of the decipherers which it inspired."--BOOK JACKET
14 editions published in 1999 in English and held by 854 WorldCat member libraries worldwide
"The Rosetta Stone has become an instantly recognizable icon of script and decipherment and is one of the most famous Egyptian antiquities in the world. Discovered by Napoleon's troops at the village of Rosetta in the western Delta in 1799, the granitoid slab is a fragment of a stela inscribed with a priestly decree in honour of Ptolemy V. The main significance of the text lies not in its content, however, but in the fact that it is written in three scripts: hieroglyphic, demotic and ancient Greek." "Richard Parkinson here tells the story of the Stone's discovery and the so-called battle of the decipherers which it inspired."--BOOK JACKET
Breaking teleprinter ciphers at Bletchley Park : general report on Tunny with emphasis on statistical methods (1945) by
Irving John Good(
)
16 editions published between 2012 and 2015 in English and held by 372 WorldCat member libraries worldwide
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit in the GRT. Explores the likely roots of the ideas entering into the Tunny cryptanalysis. Includes examples of original worksheets, and printouts of the Tunny-breaking process in action. Presents additional commentary, biographies, glossaries, essays, and bibliographies
16 editions published between 2012 and 2015 in English and held by 372 WorldCat member libraries worldwide
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit in the GRT. Explores the likely roots of the ideas entering into the Tunny cryptanalysis. Includes examples of original worksheets, and printouts of the Tunny-breaking process in action. Presents additional commentary, biographies, glossaries, essays, and bibliographies
Privacy on the Line by
Whitfield Diffie(
)
5 editions published between 1998 and 2010 in English and Undetermined and held by 235 WorldCat member libraries worldwide
A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world.Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population.In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy
5 editions published between 1998 and 2010 in English and Undetermined and held by 235 WorldCat member libraries worldwide
A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world.Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population.In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy
Applied cryptography : protocols, algorithms, and source code in C by
Bruce Schneier(
Book
)
2 editions published in 2015 in English and held by 8 WorldCat member libraries worldwide
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover
2 editions published in 2015 in English and held by 8 WorldCat member libraries worldwide
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover
Stanford LISP 1.6 manual by
L Quam(
Book
)
3 editions published between 1970 and 1978 in English and Undetermined and held by 4 WorldCat member libraries worldwide
3 editions published between 1970 and 1978 in English and Undetermined and held by 4 WorldCat member libraries worldwide
Privacy on the line the politics of wiretapping and encryption by
Whitfield Diffie(
)
1 edition published in 2007 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2007 in English and held by 2 WorldCat member libraries worldwide
Cryptanalysis of the NBS Data Encryption Standard(
Book
)
1 edition published in 1976 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1976 in English and held by 2 WorldCat member libraries worldwide
Porto Rico : a broken pledge by
Whitfield Diffie(
Book
)
1 edition published in 1931 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1931 in English and held by 2 WorldCat member libraries worldwide
Privacy and authentication : an introduction to Cryptography by
Whitfield Diffie(
)
2 editions published in 1979 in English and held by 2 WorldCat member libraries worldwide
Schriftwesen ; Chiffriermaschine, Dechiffriermaschine
2 editions published in 1979 in English and held by 2 WorldCat member libraries worldwide
Schriftwesen ; Chiffriermaschine, Dechiffriermaschine
System security 30.3. - 3.4.92 by
Thomas Beth(
Book
)
2 editions published in 1992 in English and held by 2 WorldCat member libraries worldwide
2 editions published in 1992 in English and held by 2 WorldCat member libraries worldwide
Results of an initial attempt to cryptanalyze the NBS data encryption standard by
Stanford University(
Book
)
1 edition published in 1976 in English and held by 1 WorldCat member library worldwide
1 edition published in 1976 in English and held by 1 WorldCat member library worldwide
The first ten years of public-key cryptography by
Whitfield Diffie(
)
1 edition published in 1988 in English and held by 1 WorldCat member library worldwide
1 edition published in 1988 in English and held by 1 WorldCat member library worldwide
Exhaustive cryptanalysis of the NBS data encryption standars by
Whitfield Diffie(
)
1 edition published in 1977 in English and held by 1 WorldCat member library worldwide
1 edition published in 1977 in English and held by 1 WorldCat member library worldwide
Nowy, wspaniały świat inwigilacji : podsłuch w Internecie by
Whitfield Diffie(
)
1 edition published in 2008 in Polish and held by 1 WorldCat member library worldwide
1 edition published in 2008 in Polish and held by 1 WorldCat member library worldwide
The first ten years of public-key cryptography by
Whitfield Diffie(
Book
)
1 edition published in 1988 in English and held by 1 WorldCat member library worldwide
1 edition published in 1988 in English and held by 1 WorldCat member library worldwide
Cryptopolitics by
Whitfield Diffie(
Visual
)
1 edition published in 1998 in English and held by 1 WorldCat member library worldwide
Diffie discusses network security
1 edition published in 1998 in English and held by 1 WorldCat member library worldwide
Diffie discusses network security
Latin-American civilization : colonial period by
Bailey W Diffie(
Book
)
1 edition published in 1947 in English and held by 1 WorldCat member library worldwide
1 edition published in 1947 in English and held by 1 WorldCat member library worldwide
Cryptographic technology: fifteen year forecast by
Whitfield Diffie(
Book
)
1 edition published in 1981 in Undetermined and held by 1 WorldCat member library worldwide
1 edition published in 1981 in Undetermined and held by 1 WorldCat member library worldwide
Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers
and Computer Scientists(
)
1 edition published in 1996 in English and held by 1 WorldCat member library worldwide
Encryption plays an essential role in protecting the privacy of electronic information against threats from a variety of potential attackers. In so doing, modern cryptography employs a combination of conventional or symmetric cryptographic systems for encrypting data and public key or asymmetric systems for managing the keys used by symmetric systems. Assessing the strength required of the symmetric cryptographic systems is therefore an essential step in employing cryptography for computer and communication security
1 edition published in 1996 in English and held by 1 WorldCat member library worldwide
Encryption plays an essential role in protecting the privacy of electronic information against threats from a variety of potential attackers. In so doing, modern cryptography employs a combination of conventional or symmetric cryptographic systems for encrypting data and public key or asymmetric systems for managing the keys used by symmetric systems. Assessing the strength required of the symmetric cryptographic systems is therefore an essential step in employing cryptography for computer and communication security
more

fewer

Audience Level
0 |
![]() |
1 | ||
Kids | General | Special |

- Landau, Susan Eva Author
- Parkinson, R. B. Author Editor
- Simpson, R. S.
- Fischer, M. (Mary)
- Field, J. V. Editor
- Reeds, James A. Author Editor
- Good, Irving John Author
- Michie, Donald
- Timms, Geoffrey
- British Society for the History of Mathematics Organizer of meeting
Useful Links
Associated Subjects
Antiquities C (Computer program language) Civilization Colonization Computer networks--Security measures Computers Computer security Cryptography Data encryption (Computer science) Data encryption (Computer science)--Law and legislation Diffie, Whitfield Economic history Egypt Egyptian language--Writing Egyptian language--Writing, Hieroglyphic Electronic intelligence England--Milton Keynes--Bletchley Park Great Britain Great Britain.--Government Communications Headquarters Hellman, Martin International Business Machines Corporation Latin America LISP (Computer program language) Merkle, Ralph C.--(Ralph Charles) Political science Privacy, Right of Public key cryptography Puerto Rico Rosetta stone RSA Security Software engineering Stanford University Telecommunication--Law and legislation Telecommunication--Political aspects Telecommunication--Security measures Telecommunication systems--Security measures United States United States.--National Security Agency Wiretapping
Covers
Alternative Names
Diffie, Bailey Whitfield.
Diffie, W.
Diffie, W. 1944-
Diffie, W. (Whitfield)
Diffie, Whit.
Diffie, Whit 1944-
Diffie, Whittfield 1944-
Whitfield Diffie American cryptographer
Whitfield Diffie americký informatik
Whitfield Diffie Amerikaans cryptograaf
Whitfield Diffie amerikai titkosírás szakértő (kriptográfus), 1944-
Whitfield Diffie amerikanischer Experte für Kryptographie
Whitfield Diffie crittografo statunitense
Whitfield Diffie cryptographe américain
Γουίτφιλντ Ντίφι Αμερικανός κρυπτογράφος
Витфилд Дифи
Вітфілд Діффі
Диффи, Уитфилд
Уитфилд Диффи
ויטפילד דיפי
ويتفيلد ديفى
ويتفيلد ديفي
ویتفیلد دیفی
হুইটফিল্ড ডিফি
হুইটফিল্ড ডিফি মার্কিন কম্পিউটার বিজ্ঞানী
விட்பீல்டு டிஃபீ
휫필드 디피
ホイットフィールド・ディフィー
惠特菲爾德·迪菲
惠特菲爾德·迪菲 美國密碼學家
Languages