An overview of public key cryptography

@article{Hellman1978AnOO,
  title={An overview of public key cryptography},
  author={Melanie J. Hellman},
  journal={IEEE Communications Society Magazine},
  year={1978},
  volume={16},
  pages={24-32}
}
With a public key cryptosystem, the key used to encipher a message can be made public without compromising the secrecy of a different key needed to decipher that message. Cryptography has been of great importance to the military and diplomatic communities since antiquity but failed, until recently,.to attract much commercial attention. Recent commercial interest, by contrast, has been almost explosive due to the rapid computerization of information storage, transmission, and spying. Telephone… CONTINUE READING

Figures from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 71 CITATIONS

Encrypting video and image streams using OpenCL code on-demand

  • CLEI Electron. J.
  • 2014
VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Detecting Unauthorized Modification of HTTP Communication with Steganography

  • 2010 Fifth International Conference on Internet and Web Applications and Services
  • 2010
VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks

VIEW 3 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Unified Analysis of Secrecy Capacity Over N*Nakagami Cascaded Fading Channel

  • 2018 18th International Symposium on Communications and Information Technologies (ISCIT)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

A data-aware confidential tunnel for wireless sensor media networks

  • Multimedia Tools and Applications
  • 2017
VIEW 1 EXCERPT
CITES METHODS

FILTER CITATIONS BY YEAR

1979
2018

CITATION STATISTICS

  • 5 Highly Influenced Citations

  • Averaged 4 Citations per year from 2017 through 2019

References

Publications referenced by this paper.