Whitfield Diffie
#960
Most Influential Person Now
American cryptographer
Whitfield Diffie's AcademicInfluence.com Rankings
Whitfield Diffiecomputer-science Degrees
Computer Science
#120
World Rank
#127
Historical Rank
#69
USA Rank
Software Engineering
#103
World Rank
#103
Historical Rank
#49
USA Rank
Database
#489
World Rank
#512
Historical Rank
#194
USA Rank
Download Badge
Computer Science
Why Is Whitfield Diffie Influential?
(Suggest an Edit or Addition)According to Wikipedia, Bailey Whitfield 'Whit' Diffie , ForMemRS, is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper New Directions in Cryptography introduced a radically new method of distributing cryptographic keys, that helped solve key distribution—a fundamental problem in cryptography. Their technique became known as Diffie–Hellman key exchange. The article stimulated the almost immediate public development of a new class of encryption algorithms, the asymmetric key algorithms.
Whitfield Diffie's Published Works
Published Works
- New Directions in Cryptography (1976) (15076)
- Authentication and authenticated key exchanges (1992) (1148)
- Privacy and authentication: An introduction to cryptography (1979) (498)
- Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard (1977) (459)
- Multiuser cryptographic techniques (1976) (262)
- The first ten years of public-key cryptography (1988) (247)
- A secure audio teleconference system (1988) (211)
- Privacy and authentication for wireless local area networks (1994) (208)
- Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists (1996) (206)
- The risks of key recovery, key escrow, and trusted third-party encryption (1997) (179)
- Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition (1998) (98)
- SMS4 Encryption Algorithm for Wireless Networks (2008) (91)
- Analysis of a Public Key Approach Based on Polynomial Substitution (1985) (62)
- Cracking Codes: The Rosetta Stone and Decipherment (2002) (52)
- Privacy on the Line (1998) (46)
- Risking Communications Security: Potential Hazards of the Protect America Act (2008) (41)
- Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP (2006) (26)
- Information security: 50 years behind, 50 years ahead (2008) (14)
- Security for the DoD Transmission Control Protocol (1986) (13)
- Crypto policy perspectives (1994) (13)
- Cryptographic technology: fifteen year forecast (1982) (13)
- Bugs in our Pockets: The Risks of Client-Side Scanning (2021) (12)
- Exhaustive Cryptanalysis of the NBS Data Encryption Standard (2022) (12)
- Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure (2011) (10)
- The export of cryptography in the 20th century and the 21st (2001) (10)
- Communications surveillance (2009) (10)
- General Report on Tunny: With Emphasis on Statistical Methods (2009) (8)
- Breaking Teleprinter Ciphers at Bletchley Park: General Report on Tunny with Emphasis on Statistical Methods (1945) (2015) (8)
- Internet eavesdropping: a brave new world of wiretapping (2008) (7)
- E-commerce and security (1998) (7)
- Information Assurance Technology Forecast 2008 (2008) (6)
- The impact of a secret cryptographic standard on encryption, privacy, law, enforcement and technology (1995) (6)
- Who holds the keys? (1992) (6)
- An introduction to cryptography (1984) (6)
- Improving online security. (2008) (5)
- The National Security Establishment and the Development of Public-Key Cryptography (1996) (4)
- The export of cryptography in the 20th and the 21st centuries (2007) (4)
- Communications Surveillance: Privacy and Security at Risk (2009) (4)
- Brave new world of wiretapping. (2008) (4)
- As simple as possible---but not more so (2011) (3)
- Chattering about SIGINT (2006) (3)
- The Evolving Meaning of Information Security (2016) (2)
- Ultimate cryptography (2001) (2)
- Cryptography in public: a brief history (1995) (2)
- New Directions in Cryptography (1976) (2021) (1)
- Glossary and Index (2015) (1)
- The Adolescence of Public-Key Cryptography (Abstract) (1989) (1)
- Communications in the 1990s (2007) (0)
- Some Probability Techniques (2015) (0)
- The Challenges of IoT, TLS, and Random Number Generators in the Real World (2022) (0)
- Internal surveillance, external risks (2007) (0)
- KNAPSACK CIPHER AND CRYPTANALYST USING HEURISTIC METHODS (0)
- Privacy: Protections and Threats (2007) (0)
- Registration and Circulation (2015) (0)
- Organisation of the Testery (2015) (0)
- The 5202 Machine (2015) (0)
- Machine Setting Organisation (2015) (0)
- Mr Newman's Section (2015) (0)
- Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted Systems (1983) (0)
- The First Break (2015) (0)
- What Did We Do Before Biometric Passports? A Review of Who Are You? Identification, Deception, and Surveillance in Early Modern Europe by Valentin Groebner (2008) (0)
- Some Historical Notes (2015) (0)
- Lunch speaker: Whitfield Diffie: We Can Tap It for You Wholesale (2000) (0)
- National Security and Commercial Security: Division of Responsibility (1981) (0)
- Wheel-Breaking from Key (2015) (0)
- Specialized Counting Machines (2015) (0)
- Appendix D: Initial Conception of Colossus (2015) (0)
- And Then It All Changed (2007) (0)
- Testery Methods 1942-44 (2015) (0)
- Cryptography, the Next Two Decades (1981) (0)
- Chi-Breaking from Cipher (2015) (0)
- Cryptography in the 1990s (2007) (0)
- Raw Materials - Production, with Plans of Tunny Links (2015) (0)
- Appendix C: the 5202 Machine (2015) (0)
- Appendix E: List of Scanned Exhibits (2015) (0)
- Development of Robinson and Colossus (2015) (0)
- Key escrow: its impact and alternatives, testimony before the Senate Judiciary Subcommitee on Technology and Law (1997) (0)
- Cryptography: Past, Present and Future (2007) (0)
- Early Hand Methods (2015) (0)
- Appendix A: Transmission of Teleprinter Signals (2015) (0)
- Research into the QEP System (2015) (0)
- Tapemaking and Checking (2015) (0)
- Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue (1996) (0)
- Recovery of Motor Patterns from De-chi (2015) (0)
- Book Review: Privacy on the Line: The Politics of Wiretapping and Encryption Authors of Books: by Whitfield Diffie and Susan Landau (2008) (0)
- Cryptography and Public Policy (2007) (0)
- Wheel-breaking from key, Organisation (2015) (0)
- Hand Statistical Methods (2015) (0)
- A Report by an Ad Hoc Group of Cryptographers and Computer Scientists & Trusted Third Party Encryption (1998) (0)
- Method for keeping safety of communication and device for safely transferring data (1994) (0)
- Appendix B: Activities at Knockholt (2015) (0)
This paper list is powered by the following services:
Other Resources About Whitfield Diffie
What Schools Are Affiliated With Whitfield Diffie?
Whitfield Diffie is affiliated with the following schools: