Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography

نویسنده

  • Steven M. Bellovin
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Weapons of Mass Destruction in Context; Investigating the Links between Militarization and Godlessness of Modern Politics

Modern brutality, which found its culmination in using weapons of mass destruction (WMD) against humanity, is the dark side of the principal teachings of the Enlightenment. The great thinkers of the Enlightenment, blaming religion as the main source of violence, removed God from the center of Western political and social thought to replace it with human. Although they were not conscious of the ...

متن کامل

EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...

متن کامل

The Non-Aligned Movement and Nuclear Disarmament: Stance and Actions

The emergence of nuclear weapons as a new actor in international relations has introduced a new area in the international security arena. Since the appearance of these weapons, there have been increasing efforts to limit and destroy them in order to achieve global peace in the framework of disarmament and centered around the Treaty on the Non-Proliferation of Nuclear Weapons. Along with the eme...

متن کامل

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006