Cryptographic technology: fifteen year forecast

This paper examines the forces driving public development of cryptography today and projects the course of the field over the next fifteen years with attention to the possible influence of government regulation.This paper was prepared, under contractual arrangements to CRC Systems, in support of the Commerce Department (National Telecommunications and Information Administration, Special Projects Office) response to a White House Office of Science and Technology Policy request that the secretaries of the Departments of Commerce and Defense propose a national policy on cryptography.

[1]  Whitfield Diffie,et al.  Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  Y. Kato Words into action III: A commercial system: Dynamic programming handles varying word lengths in this pioneer continuous-speech recognizer , 1980, IEEE Spectrum.

[4]  AARON D. WYNER An analog scrambling scheme which does not expand bandwidth, Part II: Continuous time , 1979, IEEE Trans. Inf. Theory.

[5]  Aaron D. Wyner An analog scrambling scheme which does not expand bandwidth, Part I: Discrete time , 1979, IEEE Trans. Inf. Theory.

[6]  R. Reddy Words into action II: A task-oriented system: Harpy is an experimental, continuous-speech recognition system that exploits a low-cost minicomputer , 1980, IEEE Spectrum.

[7]  N Wade,et al.  Science meetings catch the u.s.-Soviet chill. , 1980, Science.

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Whitfield Diffie,et al.  Multiuser cryptographic techniques , 1976, AFIPS '76.

[10]  G. Kaplan,et al.  Computers/software: Words into action: I: Spoken advice can be recognized and converted to standard digital commands , 1980, IEEE Spectrum.

[11]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[12]  Martin E. Hellman,et al.  Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.