Cryptology in Transition
- 1 December 1979
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Computing Surveys
- Vol. 11 (4) , 285-303
- https://doi.org/10.1145/356789.356792
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- Privacy and authentication: An introduction to cryptographyProceedings of the IEEE, 1979
- On the inherent intractability of certain coding problems (Corresp.)IEEE Transactions on Information Theory, 1978
- Cryptology: A Secret Meeting at IDA?Science, 1978
- A cryptographic key management scheme for implementing the Data Encryption StandardIBM Systems Journal, 1978
- Cryptography: On the Brink of a Revolution?Science, 1977
- Computer Encryption and the National Security Agency ConnectionScience, 1977
- Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption StandardComputer, 1977
- An extension of the Shannon theory approach to cryptographyIEEE Transactions on Information Theory, 1977
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- Cryptography and Computer PrivacyScientific American, 1973