Whitfield Diffie
Turing Award
IEEE Richard W. Hamming Medal
Marconi Prize
Paris Kanellakis Award
EFF Pioneer Award
National Inventors Hall of Fame
http://cisac.fsi.stanford.edu/people/whitfield_diffie
https://dl.acm.org/profile/81100513962
https://zbmath.org/authors/?q=ai:diffie.whitfield
https://mathgenealogy.org/id.php?id=226956
https://en.wikipedia.org/wiki/Whitfield_Diffie
https://www.wikidata.org/entity/Q462089
https://www.scopus.com/authid/detail.uri?authorId=6603621741
http://isni.org/isni/0000000116726525
https://viaf.org/viaf/74088727
https://id.loc.gov/authorities/names/n97101609
https://d-nb.info/gnd/108912063X
http://id.worldcat.org/fast/1536207
http://amturing.acm.org/award_winners/diffie_8371646.cfm
http://www.computerhistory.org/fellowawards/hall/whitfield-diffie/
https://mathscinet.ams.org/mathscinet/MRAuthorID/278616
books/acm/22/S2022
Harold Abelson
Ross J. Anderson
Steven M. Bellovin
Josh Benaloh
Matt Blaze
Jon Callas
Whitfield Diffie
Susan Landau 0001
Peter G. Neumann
Ronald L. Rivest
Jeffrey I. Schiller
Bruce Schneier
Vanessa Teague
Carmela Troncoso
Bugs in our pockets: the risks of client-side scanning.
2024
January
10
J. Cybersecur.
1
https://doi.org/10.1093/cybsec/tyad020
db/journals/cybersecurity/cybersecurity10.html#AbelsonABBBCDLNRSSTT24
James P. Hughes 0001
Whitfield Diffie
The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad random numbers are still with us and are proliferating in modern systems.
18-40
2022
20
ACM Queue
3
https://doi.org/10.1145/3546933
db/journals/queue/queue20.html#HughesD22
Whitfield Diffie
Martin E. Hellman
New Directions in Cryptography.
365-390
2022
Democratizing Cryptography
https://doi.org/10.1145/3549993.3550007
books/acm/22/S2022
db/books/collections/S2022.html#DiffieH22
Whitfield Diffie
Martin E. Hellman
Exhaustive Cryptanalysis of the NBS Data Encryption Standard.
391-414
2022
Democratizing Cryptography
https://doi.org/10.1145/3549993.3550008
books/acm/22/S2022
db/books/collections/S2022.html#DiffieH22a
Whitfield Diffie
Martin E. Hellman
Privacy and Authentication: An Introduction to Cryptography.
431-514
2022
Democratizing Cryptography
https://doi.org/10.1145/3549993.3550010
books/acm/22/S2022
db/books/collections/S2022.html#DiffieH22b
Hal Abelson
Ross J. Anderson
Steven M. Bellovin
Josh Benaloh
Matt Blaze
Jon Callas
Whitfield Diffie
Susan Landau 0001
Peter G. Neumann
Ronald L. Rivest
Jeffrey I. Schiller
Bruce Schneier
Vanessa Teague
Carmela Troncoso
Bugs in our Pockets: The Risks of Client-Side Scanning.
2021
abs/2110.07450
CoRR
https://arxiv.org/abs/2110.07450
db/journals/corr/corr2110.html#abs-2110-07450
Whitfield Diffie
The Evolving Meaning of Information Security.
5
2016
KDD
https://doi.org/10.1145/2939672.2949031
conf/kdd/2016
db/conf/kdd/kdd2016.html#Diffie16
Harold Abelson
Ross J. Anderson
Steven M. Bellovin
Josh Benaloh
Matt Blaze
Whitfield Diffie
John Gilmore
Matthew Green 0001
Susan Landau 0001
Peter G. Neumann
Ronald L. Rivest
Jeffrey I. Schiller
Bruce Schneier
Michael A. Specter
Daniel J. Weitzner
Keys under doormats.
24-26
2015
58
Commun. ACM
10
https://doi.org/10.1145/2814825
db/journals/cacm/cacm58.html#AbelsonABBBDGGL15
Harold Abelson
Ross J. Anderson
Steven M. Bellovin
Josh Benaloh
Matt Blaze
Whitfield Diffie
John Gilmore
Matthew Green 0001
Susan Landau 0001
Peter G. Neumann
Ronald L. Rivest
Jeffrey I. Schiller
Bruce Schneier
Michael A. Specter
Daniel J. Weitzner
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
69-79
2015
1
J. Cybersecur.
1
https://doi.org/10.1093/cybsec/tyv009
https://www.wikidata.org/entity/Q116947304
db/journals/cybersecurity/cybersecurity1.html#AbelsonABBBDGG015
Steven M. Bellovin
Scott O. Bradner
Whitfield Diffie
Susan Landau 0001
Jennifer Rexford
As simple as possible - but not more so.
30-33
2011
54
Commun. ACM
8
https://doi.org/10.1145/1978542.1978553
db/journals/cacm/cacm54.html#BellovinBDLR11
Whitfield Diffie
Susan Landau 0001
Communications surveillance: privacy and security at risk.
42-47
2009
52
Commun. ACM
11
https://doi.org/10.1145/1592761.1592776
db/journals/cacm/cacm52.html#DiffieL09
Whitfield Diffie
Susan Landau 0001
Communications Surveillance: Privacy and Security at Risk.
10
2009
7
ACM Queue
8
https://doi.org/10.1145/1613128.1613130
db/journals/queue/queue7.html#DiffieL09
Whitfield Diffie
Information security: 50 years behind, 50 years ahead.
55-57
2008
51
Commun. ACM
1
https://doi.org/10.1145/1327452.1327478
db/journals/cacm/cacm51.html#Diffie08
Whitfield Diffie
What Did We Do Before Biometric Passports? A Review of Who Are You? Identification, Deception, and Surveillance in Early Modern Europe by Valentin Groebner.
368-369
2008
32
Cryptologia
4
https://doi.org/10.1080/01611190802215077
db/journals/cryptologia/cryptologia32.html#Diffie08
Steven M. Bellovin
Terry V. Benzel
Bob Blakley 0001
Dorothy E. Denning
Whitfield Diffie
Jeremy Epstein
Paulo Veríssimo
Information Assurance Technology Forecast 2008.
16-23
2008
6
IEEE Secur. Priv.
1
https://doi.org/10.1109/MSP.2008.13
http://doi.ieeecomputersociety.org/10.1109/MSP.2008.13
https://www.wikidata.org/entity/Q57603695
db/journals/ieeesp/ieeesp6.html#BellovinBBDDEV08
Steven M. Bellovin
Matt Blaze
Whitfield Diffie
Susan Landau 0001
Peter G. Neumann
Jennifer Rexford
Risking Communications Security: Potential Hazards of the Protect America Act.
24-33
2008
6
IEEE Secur. Priv.
1
https://doi.org/10.1109/MSP.2008.17
http://doi.ieeecomputersociety.org/10.1109/MSP.2008.17
https://www.wikidata.org/entity/Q55879637
db/journals/ieeesp/ieeesp6.html#BellovinBDSNR08
Whitfield Diffie
Susan Landau 0001
Privacy on the line: the politics of wiretapping and encryption.
30-32
2008
39
SIGACT News
4
https://doi.org/10.1145/1466390.1466397
https://www.wikidata.org/entity/Q121088049
db/journals/sigact/sigact39.html#DiffieL08
Whitfield Diffie
George Ledin
SMS4 Encryption Algorithm for Wireless Networks.
329
2008
2008
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2008/329
db/journals/iacr/iacr2008.html#DiffieL08
Whitfield Diffie
Susan Landau 0001
Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.).
I-XVII, 1-472
MIT Press
2007
978-0-262-04240-6
http://mitpress.mit.edu/books/privacy-line
Steven M. Bellovin
Matt Blaze
Whitfield Diffie
Susan Landau 0001
Jennifer Rexford
Peter G. Neumann
Internal surveillance, external risks.
128
2007
50
Commun. ACM
12
https://doi.org/10.1145/1323688.1323717
db/journals/cacm/cacm50.html#BellovinBDLRN07
Whitfield Diffie
Cryptography: Past, Present and Future.
1529-1530
2007
conf/otm/2007-2
OTM Conferences (2)
https://doi.org/10.1007/978-3-540-76843-2_29
db/conf/otm/otm2007-2.html#Diffie07
Whitfield Diffie
Chattering about SIGINT.
9
2006
4
IEEE Secur. Priv.
1
https://doi.org/10.1109/MSP.2006.9
http://doi.ieeecomputersociety.org/10.1109/MSP.2006.9
db/journals/ieeesp/ieeesp4.html#Diffie06
Whitfield Diffie
Ultimate cryptography.
84-86
2001
44
Commun. ACM
3
https://doi.org/10.1145/365181.365214
db/journals/cacm/cacm44.html#Diffie01
Whitfield Diffie
Lunch speaker: Whitfield Diffie: We Can Tap It for You Wholesale.
10
2000
CFP
https://doi.org/10.1145/332186.545210
conf/cfp/2000
db/conf/cfp/cfp2000.html#Diffie00
Whitfield Diffie
E-commerce and security.
116-117
1998
6
ACM Stand.
3
https://doi.org/10.1145/324042.324047
db/journals/standardview/standardview6.html#Diffie98
Hal Abelson
Ross J. Anderson
Steven M. Bellovin
Josh Benaloh
Matt Blaze
Whitfield Diffie
John Gilmore
Peter G. Neumann
Ronald L. Rivest
Jeffrey I. Schiller
Bruce Schneier
The risks of key recovery, key escrow, and trusted third-party encryption.
241-257
1997
2
World Wide Web J.
db/journals/wwwj/wwwj2.html#AbelsonABBBDGNR97
Thomas Beth
Whitfield Diffie
Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue.
7-9
1996
7
Des. Codes Cryptogr.
1-2
db/journals/dcc/dcc7.html#BethD96
Whitfield Diffie
The National Security Establishment and the Development of Public-Key Cryptography.
9-12
1996
7
Des. Codes Cryptogr.
1-2
db/journals/dcc/dcc7.html#Diffie96
https://doi.org/10.1023/A:1018032210651
Susan Landau 0001
Stephen T. Kent
Clinton Brooks
Scott Charney
Dorothy E. Denning
Whitfield Diffie
Anthony Lauck
Douglas Miller
Peter G. Neumann
David Sobel
Crypto Policy Perspectives.
115-121
1994
37
Commun. ACM
8
db/journals/cacm/cacm37.html#LandauKBCDDLMNS94
https://doi.org/10.1145/179606.179726
Ashar Aziz
Whitfield Diffie
Privacy and authentication for wireless local area networks.
25-31
1994
1
IEEE Wirel. Commun.
1
https://doi.org/10.1109/98.295357
db/journals/wc/wc1.html#AzizD94
Whitfield Diffie
Paul C. van Oorschot
Michael J. Wiener
Authentication and Authenticated Key Exchanges.
107-125
1992
2
Des. Codes Cryptogr.
2
db/journals/dcc/dcc2.html#DiffieOW92
https://doi.org/10.1007/BF00124891
https://www.wikidata.org/entity/Q56144770
Dorothy E. Denning
James Bidzos
David Bellin
John Gilmore
Whitfield Diffie
John Perry Barlow
Who holds the keys?
133-147
1992
CFP
https://doi.org/10.1145/142652.142672
conf/cfp/1992
db/conf/cfp/cfp1992.html#DenningBBGDB92
Whitfield Diffie
The Adolescence of Public-Key Cryptography (Abstract).
2
https://doi.org/10.1007/3-540-46885-4_1
1989
conf/eurocrypt/89
EUROCRYPT
db/conf/eurocrypt/eurocrypt89.html#Diffie89
Whitfield Diffie
The first ten years of public-key cryptography.
560-577
1988
76
Proc. IEEE
5
https://doi.org/10.1109/5.4442
https://www.wikidata.org/entity/Q29303259
db/journals/pieee/pieee76.html#Diffie88
David G. Steer
Leo Strawczynski
Whitfield Diffie
Michael J. Wiener
A Secure Audio Teleconference System.
520-528
https://doi.org/10.1007/0-387-34799-2_37
1988
conf/crypto/1988
CRYPTO
db/conf/crypto/crypto88.html#SteerSDW88
Whitfield Diffie
Security for the DoD Transmission Control Protocol.
108-127
https://doi.org/10.1007/3-540-39799-X_11
1985
conf/crypto/1985
CRYPTO
db/conf/crypto/crypto85.html#Diffie85
Harriet J. Fell
Whitfield Diffie
Analysis of a Public Key Approach Based on Polynomial Substitution.
340-349
https://doi.org/10.1007/3-540-39799-X_24
1985
conf/crypto/1985
CRYPTO
db/conf/crypto/crypto85.html#FellD85
Whitfield Diffie
Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted Systems.
136-138
1983
conf/sp/1983
S&P
db/conf/sp/sp1983.html#Diffie83
https://doi.org/10.1109/SP.1983.10021
https://doi.ieeecomputersociety.org/10.1109/SP.1983.10021
Whitfield Diffie
Cryptographic technology: fifteen year forecast.
38-57
1982
14
SIGACT News
4
https://doi.org/10.1145/1008902.1008903
db/journals/sigact/sigact14.html#Diffie82
Whitfield Diffie
Cryptography, the Next Two Decades.
84-108
1981
conf/crypto/1981
CRYPTO
db/conf/crypto/crypto81.html#Diffie81
Whitfield Diffie
Melville Klein
Michael L. Dertouzos
Andrew Gleason
Dean Smith
National Security and Commercial Security: Division of Responsibility.
154-156
1981
conf/crypto/1981
CRYPTO
db/conf/crypto/crypto81.html#DiffieKDGS81
Whitfield Diffie
Martin E. Hellman
Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard.
74-84
1977
10
Computer
6
https://doi.org/10.1109/C-M.1977.217750
http://doi.ieeecomputersociety.org/10.1109/C-M.1977.217750
https://www.wikidata.org/entity/Q55878791
db/journals/computer/computer10.html#DiffieH77
Whitfield Diffie
Martin E. Hellman
New directions in cryptography.
644-654
1976
22
IEEE Trans. Inf. Theory
6
https://doi.org/10.1109/TIT.1976.1055638
https://www.wikidata.org/entity/Q27178858
db/journals/tit/tit22.html#DiffieH76
Whitfield Diffie
Martin E. Hellman
Multiuser cryptographic techniques.
109-112
1976
AFIPS National Computer Conference
https://doi.org/10.1145/1499799.1499815
conf/afips/1976
db/conf/afips/ncc76.html#DiffieH76
Harold AbelsonHal Abelson
Ross J. Anderson
Ashar Aziz
John Perry Barlow
David Bellin
Steven M. Bellovin
Josh Benaloh
Terry V. Benzel
Thomas Beth
James Bidzos
Bob Blakley 0001
Matt Blaze
Scott O. Bradner
Clinton Brooks
Jon Callas
Scott Charney
Dorothy E. Denning
Michael L. Dertouzos
Jeremy Epstein
Harriet J. Fell
John Gilmore
Andrew Gleason
Matthew Green 0001
Martin E. Hellman
James P. Hughes 0001
Stephen T. Kent
Melville Klein
Susan Landau 0001
Anthony Lauck
George Ledin
Douglas Miller
Peter G. Neumann
Paul C. van Oorschot
Jennifer Rexford
Ronald L. Rivest
Jeffrey I. Schiller
Bruce Schneier
Dean Smith
David Sobel
Michael A. Specter
David G. Steer
Leo Strawczynski
Vanessa Teague
Carmela Troncoso
Paulo Veríssimo
Daniel J. Weitzner
Michael J. Wiener