Whitfield Diffie
According to our database1,
Whitfield Diffie
authored at least 42 papers
between 1976 and 2024.
Collaborative distances:
Collaborative distances:
Awards
Turing Prize recipient
Turing Prize 2015, "For fundamental contributions to modern cryptography. Diffie and Hellman's groundbreaking 1976 paper, "New Directions in Cryptography," introduced the ideas of public-key cryptography and digital signatures, which are the foundation for most regularly-used security protocols on the internet today." awarded to Whitfield Diffie and Martin E. Hellman.
ACM Fellow
ACM Fellow 2020, "For the invention of asymmetric public-key cryptography and the promulgation of a practical cryptographic key-exchange method".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on viaf.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
J. Cybersecur., January, 2024
2022
The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad random numbers are still with us and are proliferating in modern systems.
ACM Queue, 2022
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022
2016
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016
2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015
2011
2009
2008
IEEE Secur. Priv., 2008
What Did We Do Before Biometric Passports? A Review of <i>Who Are You? Identification, Deception, and Surveillance in Early Modern Europe</i> by Valentin Groebner.
Cryptologia, 2008
2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.).
MIT Press, ISBN: 978-0-262-04240-6, 2007
2006
2001
2000
Proceedings of the Tenth Conference on Computers, 2000
1998
1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997
1996
Des. Codes Cryptogr., 1996
Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue.
Des. Codes Cryptogr., 1996
1994
IEEE Wirel. Commun., 1994
1992
Proceedings of the Second Conference on Computers, Freedom and Privacy, 1992
1989
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the Advances in Cryptology, 1988
1985
Proceedings of the Advances in Cryptology, 1985
Proceedings of the Advances in Cryptology, 1985
1983
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983
1982
1981
National Security and Commercial Security: Division of Responsibility.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981
Cryptography, the Next Two Decades.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981
1977
Computer, 1977
1976
Proceedings of the American Federation of Information Processing Societies: 1976 National Computer Conference, 1976