1998
DOI: 10.1038/scientificamerican1098-110
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography for the Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

1999
1999
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…b‫ـ‬ Asymmetric Algorithm: A user processes a secret key but also a public key. c ‫ـ‬ Cryptography protocols: Roughly speaking, crypto protocols deal with the application of cryptographic algorithms [3]. 2.…”
Section: Cryptologymentioning
confidence: 99%
See 1 more Smart Citation
“…b‫ـ‬ Asymmetric Algorithm: A user processes a secret key but also a public key. c ‫ـ‬ Cryptography protocols: Roughly speaking, crypto protocols deal with the application of cryptographic algorithms [3]. 2.…”
Section: Cryptologymentioning
confidence: 99%
“…Cryptoanalysis is of central importance for modern cryptosystems because: without people who try to break our crypto methods , we will never know whether they are really secure or not (3) .…”
Section: Cryptologymentioning
confidence: 99%
“…[Note: The relevant terms are Chief Information Officer (CIO), or Computer Security Officer (CSO).] Four convenient ways in which paleontologists can begin to understand the problems that unauthorized users cause in industry and government are by referring to Linda McCarthy's (1998) book of true, breach-of-security anecdotes and her solutions to them, Carolyn Meinel's (1998a) book The Happy Hacker, articles in the October 1998 issue of Scientific American (Cheswick and Bellovin 1998, Ford 1998, Gosling 1998, Meinel 1998b, Rivest 1998, and Zimmermann 1998, and the pages of Security Advisor magazine.…”
Section: Hackers and Vandalsmentioning
confidence: 99%