Martin E. Hellman
Affiliations:- Stanford University, USA
According to our database1,
Martin E. Hellman
authored at least 48 papers
between 1970 and 2022.
Collaborative distances:
Collaborative distances:
Awards
Turing Prize recipient
Turing Prize 2015, "For fundamental contributions to modern cryptography. Diffie and Hellman's groundbreaking 1976 paper, "New Directions in Cryptography," introduced the ideas of public-key cryptography and digital signatures, which are the foundation for most regularly-used security protocols on the internet today." awarded to Whitfield Diffie and Martin E. Hellman.
ACM Fellow
ACM Fellow 2020, "For the invention of asymmetric public-key cryptography and the promulgation of a practical cryptographic key-exchange method".
IEEE Fellow
IEEE Fellow 1980, "For contributions to cryptography.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on viaf.org
-
on id.loc.gov
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2022
An Improved Algorithm for Computing Logarithms over <i>GF</i>(<i>p</i>) and Its Cryptographic Significance.
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022
2017
2002
1994
1992
1988
1987
1983
1982
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982
Cryptographic Key Size Issues.
Proceedings of the COMPCON'82, 1982
1981
Inf. Process. Lett., 1981
On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981
1980
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980
1979
IEEE Trans. Inf. Theory, 1979
1978
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.).
IEEE Trans. Inf. Theory, 1978
IEEE Trans. Inf. Theory, 1978
Security in communication networks.
Proceedings of the American Federation of Information Processing Societies: 1978 National Computer Conference, 1978
1977
IEEE Trans. Inf. Theory, 1977
Computer, 1977
1976
Inf. Control., January, 1976
IEEE Trans. Inf. Theory, 1976
Proceedings of the American Federation of Information Processing Societies: 1976 National Computer Conference, 1976
1975
1974
Finite-memory algorithms for estimating the mean of a Gaussian distribution (Corresp.).
IEEE Trans. Inf. Theory, 1974
1972
IEEE Trans. Inf. Theory, 1972
IEEE Trans. Inf. Theory, 1972
IEEE Trans. Inf. Theory, 1972
1970
IEEE Trans. Syst. Sci. Cybern., 1970
IEEE Trans. Inf. Theory, 1970
IEEE Trans. Inf. Theory, 1970
IEEE Trans. Inf. Theory, 1970