skip to main content
research-article

New directions in cryptography

Published: 01 September 2006 Publication History
  • Get Citation Alerts
  • Abstract

    Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper suggests ways to solve these currently open problems. It also discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

    Cited By

    View all
    • (2024)A secure cross-domain authentication scheme based on threshold signature for MECJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00631-x13:1Online publication date: 22-Mar-2024
    • (2024)UniSAV: A Unified Framework for Internet-Scale Source Address ValidationProceedings of the 2024 Applied Networking Research Workshop10.1145/3673422.3674888(81-87)Online publication date: 23-Jul-2024
    • (2024)Public Integrity Auditing Scheme for Shared Encrypted DataProceedings of the 5th International Conference on Computer Information and Big Data Applications10.1145/3671151.3671367(1237-1241)Online publication date: 26-Apr-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Information Theory
    IEEE Transactions on Information Theory  Volume 22, Issue 6
    November 1976
    142 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 September 2006

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A secure cross-domain authentication scheme based on threshold signature for MECJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00631-x13:1Online publication date: 22-Mar-2024
    • (2024)UniSAV: A Unified Framework for Internet-Scale Source Address ValidationProceedings of the 2024 Applied Networking Research Workshop10.1145/3673422.3674888(81-87)Online publication date: 23-Jul-2024
    • (2024)Public Integrity Auditing Scheme for Shared Encrypted DataProceedings of the 5th International Conference on Computer Information and Big Data Applications10.1145/3671151.3671367(1237-1241)Online publication date: 26-Apr-2024
    • (2024)Communication Complexity of the Secret Key Agreement in Algorithmic Information TheoryACM Transactions on Computation Theory10.1145/3665163Online publication date: 17-May-2024
    • (2024)Towards Post-Quantum Verifiable CredentialsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3669932(1-10)Online publication date: 30-Jul-2024
    • (2024)Enhanced Watermarking for Paper-Based Digital Microfluidic BiochipsACM Transactions on Design Automation of Electronic Systems10.1145/366130929:4(1-27)Online publication date: 29-Apr-2024
    • (2024)Digital Signatures for Authenticating Compressed JPEG ImagesProceedings of the 1st Workshop on Security-Centric Strategies for Combating Information Disorder10.1145/3660512.3665522(1-12)Online publication date: 1-Jul-2024
    • (2024)Secure Archival is Hard... Really HardProceedings of the 16th ACM Workshop on Hot Topics in Storage and File Systems10.1145/3655038.3666093(38-46)Online publication date: 8-Jul-2024
    • (2024)Federated Repair of Deep Neural NetworksProceedings of the 5th IEEE/ACM International Workshop on Deep Learning for Testing and Testing for Deep Learning10.1145/3643786.3648025(17-24)Online publication date: 20-Apr-2024
    • (2024)Efficient Unbalanced Quorum PSI from Homomorphic EncryptionProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657001(1003-1016)Online publication date: 1-Jul-2024
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media