{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:58:02Z","timestamp":1754488682916,"version":"3.41.0"},"publisher-location":"New York, NY, USA","edition-number":"1","reference-count":93,"publisher":"ACM","isbn-type":[{"type":"print","value":"9781450398275"}],"license":[{"start":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T00:00:00Z","timestamp":1661299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,24]]},"DOI":"10.1145\/3549993.3549997","type":"book-chapter","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T14:36:18Z","timestamp":1661524578000},"page":"19-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Public Key Cryptography\u2019s Impact on Society: How Diffie and Hellman Changed the World"],"prefix":"10.1145","author":[{"given":"Paul C.","family":"van Oorschot","sequence":"first","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2022,8,26]]},"reference":[{"key":"e_1_3_2_1_2_1","first-page":"69","article-title":"Keys under doormats: Mandating insecurity by requiring government access to all data and communications","volume":"1","author":"Abelson H.","year":"2015","unstructured":"H. Abelson , R. J. Anderson , S. M. Bellovin , J. Benaloh , M. Blaze , W. Diffie , J. Gilmore , M. Green , S. Landau , P. G. Neumann , R. L. Rivest , J. I. Schiller , B. Schneier , M. Specter , and D. J. Weitzner . 2015 . Keys under doormats: Mandating insecurity by requiring government access to all data and communications . J. Cybersecur. 1 , 1, 69 \u2013 79 . Shorter version in: Commun. ACM 58, 10 (2015), 24\u201326. H. Abelson, R. J. Anderson, S. M. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau, P. G. Neumann, R. L. Rivest, J. I. Schiller, B. Schneier, M. Specter, and D. J. Weitzner. 2015. Keys under doormats: Mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1, 1, 69\u201379. Shorter version in: Commun. ACM 58, 10 (2015), 24\u201326.","journal-title":"J. Cybersecur."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355601"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0306-6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2013.6703693"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.20"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_25"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"e_1_3_2_1_10_1","unstructured":"CNBC staff. March 2015. \u201c15 years after the Nasdaq\u2019s peak: Look how it\u2019s changed\u201d. https:\/\/www.cnbc.com\/15-years-after-nasdaqs-peak-look-how-its-changed\/. CNBC staff. March 2015. \u201c15 years after the Nasdaq\u2019s peak: Look how it\u2019s changed\u201d. https:\/\/www.cnbc.com\/15-years-after-nasdaqs-peak-look-how-its-changed\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.27"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. May 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard) Internet Engineering Task Force. https:\/\/www.rfc-editor.org\/info\/rfc5280. D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. May 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard) Internet Engineering Task Force. https:\/\/www.rfc-editor.org\/info\/rfc5280.","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_1_13_1","unstructured":"developerWorks Lotus. November 14 2007. The history of Notes and Domino. https:\/\/www.ibm.com\/developerworks\/lotus\/library\/ls-NDHistory\/. developerWorks Lotus. November 14 2007. The history of Notes and Domino. https:\/\/www.ibm.com\/developerworks\/lotus\/library\/ls-NDHistory\/."},{"key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.4442"},{"key":"e_1_3_2_1_16_1","volume-title":"Computer History Museum (Jan. 26","author":"Diffie W.","year":"2005","unstructured":"W. Diffie . 2005 . Information security\u2014Before and after public key cryptography. Video (1hr 16min). Talk , Computer History Museum (Jan. 26 , 2005). Retrieved March 24, 2020 from https:\/\/www.youtube.com\/watch?v=1BJuuUxCaaY. W. Diffie. 2005. Information security\u2014Before and after public key cryptography. Video (1hr 16min). Talk, Computer History Museum (Jan. 26, 2005). Retrieved March 24, 2020 from https:\/\/www.youtube.com\/watch?v=1BJuuUxCaaY."},{"key":"e_1_3_2_1_17_1","volume-title":"Aug. 16, 2016","author":"Diffie W.","year":"2015","unstructured":"W. Diffie . 2015 . Turing Award lecture , Aug. 16, 2016 , San Francisco. Video (1hr 29min): Retrieved March 24, 2020 from https:\/\/amturing.acm.org\/vp\/diffie_8371646.cfm. W. Diffie. 2015. Turing Award lecture, Aug. 16, 2016, San Francisco. Video (1hr 29min): Retrieved March 24, 2020 from https:\/\/amturing.acm.org\/vp\/diffie_8371646.cfm."},{"key":"e_1_3_2_1_18_1","volume-title":"Hellman and P. Van Oorschot","author":"Diffie W.","year":"2020","unstructured":"W. Diffie , email to R. Slayton with copy to M . Hellman and P. Van Oorschot , Oct. 31, 2020 . W. Diffie, email to R. Slayton with copy to M. Hellman and P. Van Oorschot, Oct. 31, 2020."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1499799.1499815"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1979.11256"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.21236\/ada465464"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/NDSS.2017.23160"},{"key":"e_1_3_2_1_25_1","volume-title":"CNN Business","author":"Duffy C.","year":"2020","unstructured":"C. Duffy . Big tech firms ramp up remote working orders to prevent coronavirus spread . CNN Business , March 12, 2020 . Online. Retrieved March 12, 2020 from https:\/\/www.cnn.com\/2020\/03\/10\/tech\/google-work-from-home-coronavirus\/index.html. C. Duffy. Big tech firms ramp up remote working orders to prevent coronavirus spread. CNN Business, March 12, 2020. Online. Retrieved March 12, 2020 from https:\/\/www.cnn.com\/2020\/03\/10\/tech\/google-work-from-home-coronavirus\/index.html."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2311"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_2"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119991887919"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0877-120"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098193"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40812-019-00138-6"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159961"},{"key":"e_1_3_2_1_34_1","unstructured":"Google. Transparency Report (HTTPS encryption on the web). https:\/\/transparencyreport.google.com\/https\/overview. Google. Transparency Report (HTTPS encryption on the web). https:\/\/transparencyreport.google.com\/https\/overview."},{"volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"Guillou L. C.","key":"e_1_3_2_1_35_1","unstructured":"L. C. Guillou , M. Ugon , and J.-J. Quisquater . 1992. The smart card: A standardized security device dedicated to public cryptology. Ch. 12 . In G. J. Simmons (Ed.), Contemporary Cryptology: The Science of Information Integrity . IEEE Press , 561\u2013613. L. C. Guillou, M. Ugon, and J.-J. Quisquater. 1992. The smart card: A standardized security device dedicated to public cryptology. Ch. 12. In G. J. Simmons (Ed.), Contemporary Cryptology: The Science of Information Integrity. IEEE Press, 561\u2013613."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3104985"},{"key":"e_1_3_2_1_37_1","volume-title":"Issued","author":"Hellman M. E.","year":"1980","unstructured":"M. E. Hellman and R. C. Merkle . 1980. Public key cryptographic apparatus and method. US Patent No. 4,218,582, Filed Oct. 6, 1977 , Issued Aug. 19, 1980 . M. E. Hellman and R. C. Merkle. 1980. Public key cryptographic apparatus and method. US Patent No. 4,218,582, Filed Oct. 6, 1977, Issued Aug. 19, 1980."},{"key":"e_1_3_2_1_38_1","unstructured":"D. Hellman and M. E. Hellman. 2016. A New Map for Relationships: Creating True Love at Home & Peace on the Planet. New Map Publishing. D. Hellman and M. E. Hellman. 2016. A New Map for Relationships: Creating True Love at Home & Peace on the Planet . New Map Publishing."},{"key":"e_1_3_2_1_39_1","volume-title":"Issued","author":"Hellman M. E.","year":"1980","unstructured":"M. E. Hellman , B. W. Diffie , and R. C. Merkle . 1980. Cryptographic apparatus and method. US Patent No. 4,200,770, Filed Sept. 6, 1977 , Issued Apr. 29, 1980 . M. E. Hellman, B. W. Diffie, and R. C. Merkle. 1980. Cryptographic apparatus and method. US Patent No. 4,200,770, Filed Sept. 6, 1977, Issued Apr. 29, 1980."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23055"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2767181"},{"key":"e_1_3_2_1_42_1","volume-title":"January 23, 2020. Retrieved","author":"International Card Manufacturers Association","year":"2020","unstructured":"International Card Manufacturers Association . Global plastic card industry grows to $27B . January 23, 2020. Retrieved March 24, 2020 from https:\/\/icma.com\/global-plastic-card-industry-grows-to-27b\/. International Card Manufacturers Association. Global plastic card industry grows to $27B. January 23, 2020. Retrieved March 24, 2020 from https:\/\/icma.com\/global-plastic-card-industry-grows-to-27b\/."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"C. Kaufman P. Hoffman Y. Nir P. Eronen and T. Kivinen. 2014. Internet Key Exchange Protocol Version 2 (IKEv2). RFC 7296 (Internet Standard) Internet Engineering Task Force. https:\/\/www.rfc-editor.org\/info\/rfc7296. C. Kaufman P. Hoffman Y. Nir P. Eronen and T. Kivinen. 2014. Internet Key Exchange Protocol Version 2 (IKEv2). RFC 7296 (Internet Standard) Internet Engineering Task Force. https:\/\/www.rfc-editor.org\/info\/rfc7296.","DOI":"10.17487\/rfc7296"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/163381.163390"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813665"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278568"},{"key":"e_1_3_2_1_49_1","volume-title":"Issued","author":"Kravitz D.","year":"1993","unstructured":"D. Kravitz . 1993 . Digital signature algorithm. US Patent No. 5,231,668 , Issued July 27, 1993. D. Kravitz. 1993. Digital signature algorithm. US Patent No. 5,231,668, Issued July 27, 1993."},{"key":"e_1_3_2_1_50_1","first-page":"411","article-title":"Under the radar: NSA\u2019s efforts to secure private-sector telecommunications infrastructure","volume":"7","author":"Landau S.","year":"2014","unstructured":"S. Landau . 2014 . Under the radar: NSA\u2019s efforts to secure private-sector telecommunications infrastructure . J. Natl. Secur. Law Policy 7 , 411 \u2013 442 . S. Landau. 2014. Under the radar: NSA\u2019s efforts to secure private-sector telecommunications infrastructure. J. Natl. Secur. Law Policy 7, 411\u2013442.","journal-title":"J. Natl. Secur. Law Policy"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_25"},{"key":"e_1_3_2_1_52_1","unstructured":"Steven Levy. 2001. Crypto. Penguin Books. Steven Levy. 2001. Crypto . Penguin Books."},{"key":"e_1_3_2_1_53_1","volume-title":"FIDO UAF Architectural Overview.","author":"Machani S.","year":"2017","unstructured":"S. Machani , R. Philpott , S. Srinivas , J. Kemp , and J. Hodges . 2017 . FIDO UAF Architectural Overview. Nov. 28, 2017 (v1.2 Review Draft). https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-rd- 20171128\/FIDO-UAF-COMPLETE-v1.2-rd-20171128.pdf. S. Machani, R. Philpott, S. Srinivas, J. Kemp, and J. Hodges. 2017. FIDO UAF Architectural Overview. Nov. 28, 2017 (v1.2 Review Draft). https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-rd-20171128\/FIDO-UAF-COMPLETE-v1.2-rd-20171128.pdf."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278549"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199695591.001.0001"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382285"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/359460.359473"},{"volume-title":"thesis. Electrical Engineering","author":"Merkle R. C.","key":"e_1_3_2_1_59_1","unstructured":"R. C. Merkle . June. 1979. Secrecy, Authentication, and Public Key Systems . Ph. D. thesis. Electrical Engineering , Stanford University . R. C. Merkle. June. 1979. Secrecy, Authentication, and Public Key Systems. Ph.D. thesis. Electrical Engineering, Stanford University."},{"key":"e_1_3_2_1_60_1","volume-title":"Retrieved","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . October. 2008 . Bitcoin: A peer-to-peer electronic cash system. Unrefereed paper . Retrieved March 24, 2020 from https:\/\/bitcoin.org\/bitcoin.pdf. S. Nakamoto. October. 2008. Bitcoin: A peer-to-peer electronic cash system. Unrefereed paper. Retrieved March 24, 2020 from https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_61_1","first-page":"2016","article-title":"Foreign exchange, the world\u2019s biggest market, is shrinking","volume":"11","author":"Nag A.","year":"2016","unstructured":"A. Nag and J. McGeever . 2016 . Foreign exchange, the world\u2019s biggest market, is shrinking . Reuters , February 11 , 2016 . Online. Retrieved March 24, 2020 from https:\/\/www.reuters.com\/article\/us-global-fx-peaktrading-idUSKCN0VK1UD. A. Nag and J. McGeever. 2016. Foreign exchange, the world\u2019s biggest market, is shrinking. Reuters, February 11, 2016. Online. Retrieved March 24, 2020 from https:\/\/www.reuters.com\/article\/us-global-fx-peaktrading-idUSKCN0VK1UD.","journal-title":"Reuters"},{"key":"e_1_3_2_1_62_1","volume-title":"May 15, 1973. https:\/\/www.govinfo.gov\/app\/details\/FR-1973-05-15","author":"National Bureau of Standards (US).","year":"1973","unstructured":"National Bureau of Standards (US). 1973 . Cryptographic Algorithms for Protection of Computer Data During Transmission and Dormant Storage: Solicitation of Proposals. Federal Register (38 FR 12763) , May 15, 1973. https:\/\/www.govinfo.gov\/app\/details\/FR-1973-05-15 . National Bureau of Standards (US). 1973. Cryptographic Algorithms for Protection of Computer Data During Transmission and Dormant Storage: Solicitation of Proposals. Federal Register (38 FR 12763), May 15, 1973. https:\/\/www.govinfo.gov\/app\/details\/FR-1973-05-15."},{"key":"e_1_3_2_1_63_1","volume-title":"August 27, 1974. https:\/\/www.govinfo.gov\/app\/details\/FR-1974-08-27","author":"National Bureau of Standards (US).","year":"1974","unstructured":"National Bureau of Standards (US). 1974 . Encryption Algorithms for Computer Data Protection: Reopening of Solicitation. Federal Register (39 FR 30961) , August 27, 1974. https:\/\/www.govinfo.gov\/app\/details\/FR-1974-08-27 . National Bureau of Standards (US). 1974. Encryption Algorithms for Computer Data Protection: Reopening of Solicitation. Federal Register (39 FR 30961), August 27, 1974. https:\/\/www.govinfo.gov\/app\/details\/FR-1974-08-27."},{"key":"e_1_3_2_1_64_1","volume-title":"March 17, 1975. https:\/\/www.govinfo.gov\/app\/details\/FR-1975-03-17","author":"National Bureau of Standards (US).","year":"1975","unstructured":"National Bureau of Standards (US). 1975 . Encryption Algorithm for Computer Data Protection: Request for Comments. Federal Register (40 FR 12134\u201312139) , March 17, 1975. https:\/\/www.govinfo.gov\/app\/details\/FR-1975-03-17 . National Bureau of Standards (US). 1975. Encryption Algorithm for Computer Data Protection: Request for Comments. Federal Register (40 FR 12134\u201312139), March 17, 1975. https:\/\/www.govinfo.gov\/app\/details\/FR-1975-03-17."},{"key":"e_1_3_2_1_65_1","unstructured":"A. Narayanan J. Bonneau E. Felten A. Miller and S. Goldfeder. 2016. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press. A. Narayanan J. Bonneau E. Felten A. Miller and S. Goldfeder. 2016. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction . Princeton University Press."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21344-6"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2015.0121"},{"key":"e_1_3_2_1_68_1","volume-title":"March 12, 2020.","author":"Ozzie Ray","year":"2020","unstructured":"Ray Ozzie . 2020 . Personal communication , March 12, 2020. Ray Ozzie. 2020. Personal communication, March 12, 2020."},{"key":"e_1_3_2_1_69_1","volume-title":"March 11, 2011, Computer History Museum","author":"Plutte Jon","year":"2011","unstructured":"Jon Plutte . 2011 a. Ralph Merkle: 2011 Fellows Interview . March 11, 2011, Computer History Museum , Mountain View, CA, 10-page transcript. Jon Plutte. 2011a. Ralph Merkle: 2011 Fellows Interview. March 11, 2011, Computer History Museum, Mountain View, CA, 10-page transcript."},{"key":"e_1_3_2_1_70_1","volume-title":"March 28, 2011, Computer History Museum","author":"Plutte Jon","year":"2011","unstructured":"Jon Plutte . 2011 b. Whitfield Diffie Interview . March 28, 2011, Computer History Museum , Mountain View, CA, 17-page transcript. Jon Plutte. 2011b. Whitfield Diffie Interview. March 28, 2011, Computer History Museum, Mountain View, CA, 17-page transcript."},{"volume-title":"SSL and TLS: Design and Building Secure Systems","author":"Rescorla E.","key":"e_1_3_2_1_71_1","unstructured":"E. Rescorla . 2001. SSL and TLS: Design and Building Secure Systems . Addison-Wesley . E. Rescorla. 2001. SSL and TLS: Design and Building Secure Systems. Addison-Wesley."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_2"},{"volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"Simmons G. J.","key":"e_1_3_2_1_75_1","unstructured":"G. J. Simmons . 1992b. A survey of information authentication. Ch. 7 . In G. J. Simmons (Ed.), Contemporary Cryptology: The Science of Information Integrity . IEEE Press , 379\u2013419. G. J. Simmons. 1992b. A survey of information authentication. Ch. 7. In G. J. Simmons (Ed.), Contemporary Cryptology: The Science of Information Integrity. IEEE Press, 379\u2013419."},{"volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"Simmons G. J.","key":"e_1_3_2_1_76_1","unstructured":"G. J. Simmons . 1992c. How to insure that data acquired to verify treaty compliance are trustworthy. Ch. 13 . In G. J. Simmons (Ed.), Contemporary Cryptology: The Science of Information Integrity . IEEE Press , 615\u2013630. G. J. Simmons. 1992c. How to insure that data acquired to verify treaty compliance are trustworthy. Ch. 13. In G. J. Simmons (Ed.), Contemporary Cryptology: The Science of Information Integrity. IEEE Press, 615\u2013630."},{"volume-title":"VPNs Illustrated: Tunnels, VPNs, and IPsec","author":"Snader J. C.","key":"e_1_3_2_1_77_1","unstructured":"J. C. Snader . 2005. VPNs Illustrated: Tunnels, VPNs, and IPsec . Addison-Wesley . J. C. Snader. 2005. VPNs Illustrated: Tunnels, VPNs, and IPsec. Addison-Wesley."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046664"},{"key":"e_1_3_2_1_79_1","volume-title":"FIDO Alliance Proposed Standard.","author":"Srinivas S.","year":"2017","unstructured":"S. Srinivas , D. Balfanz , E. Tiffany , and A. Czeskis . Universal 2nd Factor (U2F) Overview . FIDO Alliance Proposed Standard. April 11, 2017 . https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/FIDO-U2F-COMPLETE-v1.2-ps-20170411.pdf. S. Srinivas, D. Balfanz, E. Tiffany, and A. Czeskis. Universal 2nd Factor (U2F) Overview. FIDO Alliance Proposed Standard. April 11, 2017. https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/FIDO-U2F-COMPLETE-v1.2-ps-20170411.pdf."},{"key":"e_1_3_2_1_80_1","volume-title":"Standard & Poor\u2019s 500 Guide: 2001 Edition","author":"Poor\u2019s Standard","year":"2000","unstructured":"Standard & Poor\u2019s . 2001. Standard & Poor\u2019s 500 Guide: 2001 Edition . McGraw Hill . (This edition gives stock statistics as of Oct. 7, 2000 .) Standard & Poor\u2019s. 2001. Standard & Poor\u2019s 500 Guide: 2001 Edition. McGraw Hill. (This edition gives stock statistics as of Oct. 7, 2000.)"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382238"},{"key":"e_1_3_2_1_82_1","volume-title":"Workshop on the Economics of Information Security. Retrieved","author":"Thomas K.","year":"2020","unstructured":"K. Thomas , D. Y. Huang , D. Y. Wang , E. Bursztein , C. Grier , T. Holt , C. Kruegel , D. McCoy , S. Savage , and G. Vigna . 2015. Framing dependencies introduced by underground commoditization . Workshop on the Economics of Information Security. Retrieved March 24, 2020 from https:\/\/econinfosec.org\/archive\/weis2015\/papers\/WEIS_2015_thomas.pdf. K. Thomas, D. Y. Huang, D. Y. Wang, E. Bursztein, C. Grier, T. Holt, C. Kruegel, D. McCoy, S. Savage, and G. Vigna. 2015. Framing dependencies introduced by underground commoditization. Workshop on the Economics of Information Security. Retrieved March 24, 2020 from https:\/\/econinfosec.org\/archive\/weis2015\/papers\/WEIS_2015_thomas.pdf."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33649-3"},{"key":"e_1_3_2_1_84_1","article-title":"About machine-readable travel documents","author":"Vaudenay S.","year":"2007","unstructured":"S. Vaudenay and M. Vuagnoux . 2007 . About machine-readable travel documents . J. Phys. Conf. Ser. 77. See also ICAO Doc 9303: https:\/\/www.icao.int\/publications\/Pages\/doc-series.aspx. S. Vaudenay and M. Vuagnoux. 2007. About machine-readable travel documents. J. Phys. Conf. Ser. 77. See also ICAO Doc 9303: https:\/\/www.icao.int\/publications\/Pages\/doc-series.aspx.","journal-title":"J. Phys. Conf. Ser. 77. See also ICAO Doc 9303: https:\/\/www.icao.int\/publications\/Pages\/doc-series.aspx."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/505248.505253"},{"key":"e_1_3_2_1_86_1","volume-title":"May 18, 1995, edited","author":"Weber A.","year":"2002","unstructured":"A. Weber . 2002 b. An interview with Ralph Merkle . May 18, 1995, edited Jan. 16, 2002, to add early drafts of Merkle\u2019s \u201cPuzzles\u201d. Transcript : http:\/\/www.itas.kit.edu\/pub\/m\/2002\/mewe02a.htm (ITAS, Karlsruhe, Germany). A. Weber. 2002b. An interview with Ralph Merkle. May 18, 1995, edited Jan. 16, 2002, to add early drafts of Merkle\u2019s \u201cPuzzles\u201d. Transcript: http:\/\/www.itas.kit.edu\/pub\/m\/2002\/mewe02a.htm (ITAS, Karlsruhe, Germany)."},{"key":"e_1_3_2_1_87_1","volume-title":"The Hut Six Story: Breaking the Enigma Codes (1st. ed","author":"Welchman G.","year":"1982","unstructured":"G. Welchman . 2018. The Hut Six Story: Breaking the Enigma Codes (1st. ed . 1982 ). McGraw-Hill . G. Welchman. 2018. The Hut Six Story: Breaking the Enigma Codes (1st. ed. 1982). McGraw-Hill."},{"volume-title":"WhatsApp encryption overview (technical white paper)","year":"2017","key":"e_1_3_2_1_88_1","unstructured":"WhatsApp. WhatsApp encryption overview (technical white paper) . December 19, 2017 . https:\/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf. WhatsApp. WhatsApp encryption overview (technical white paper). December 19, 2017. https:\/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf."},{"key":"e_1_3_2_1_89_1","volume-title":"Turing Award oral history interview with Whitfield Diffie","author":"Williams H.","year":"2017","unstructured":"H. Williams and W. Diffie . A. M. Turing Award oral history interview with Whitfield Diffie . Sept. 15, 2017 , Portola Valley, CA. Video (2hr 27min): https:\/\/amturing.acm.org\/interviews\/diffie_8371646.cfm. Transcript ( 41 pages): https:\/\/amturing.acm.org\/pdf\/DiffieTuringTranscript.pdf. H. Williams and W. Diffie. A. M. Turing Award oral history interview with Whitfield Diffie. Sept. 15, 2017, Portola Valley, CA. Video (2hr 27min): https:\/\/amturing.acm.org\/interviews\/diffie_8371646.cfm. Transcript (41 pages): https:\/\/amturing.acm.org\/pdf\/DiffieTuringTranscript.pdf."},{"key":"e_1_3_2_1_90_1","volume-title":"Turing Award oral history interview with Martin Hellman","author":"Williams H.","year":"2017","unstructured":"H. Williams and M. Hellman . A. M. Turing Award oral history interview with Martin Hellman . May 19, 2017 , Palo Alto, CA. Video (2hr 40min): https:\/\/www.youtube.com\/watch?v=ydYowmPaZRw feature=youtu.be. Transcript ( 47 pages): https:\/\/amturing.acm.org\/pdf\/HellmanTuringTranscript.pdf. H. Williams and M. Hellman. A. M. Turing Award oral history interview with Martin Hellman. May 19, 2017, Palo Alto, CA. Video (2hr 40min): https:\/\/www.youtube.com\/watch?v=ydYowmPaZRw feature=youtu.be. Transcript (47 pages): https:\/\/amturing.acm.org\/pdf\/HellmanTuringTranscript.pdf."},{"key":"e_1_3_2_1_91_1","volume-title":"2nd USENIX Workshop on Hot Topics in Security (HotSec 07)","author":"Wurster G.","year":"2007","unstructured":"G. Wurster and P. C. van Oorschot . 2007 . Self-signed executables: Restricting replacement of program binaries by malware . In 2nd USENIX Workshop on Hot Topics in Security (HotSec 07) , Boston, MA. G. Wurster and P. C. van Oorschot. 2007. Self-signed executables: Restricting replacement of program binaries by malware. In 2nd USENIX Workshop on Hot Topics in Security (HotSec 07), Boston, MA."},{"volume-title":"SSH\u2014Secure Login Connections over the Internet","author":"Yl\u00f6nen T.","key":"e_1_3_2_1_92_1","unstructured":"T. Yl\u00f6nen . 1996. SSH\u2014Secure Login Connections over the Internet . USENIX Association , San Jose, CA . T. Yl\u00f6nen. 1996. SSH\u2014Secure Login Connections over the Internet. USENIX Association, San Jose, CA."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502676"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097347"},{"volume-title":"The Official PGP Users Guide","author":"Zimmermann P. R.","key":"e_1_3_2_1_95_1","unstructured":"P. R. Zimmermann . 1995. The Official PGP Users Guide . MIT Press . P. R. Zimmermann. 1995. The Official PGP Users Guide. MIT Press."},{"key":"e_1_3_2_1_96_1","unstructured":"M. E. Zurko. 2005. IBM Lotus Notes\/Domino: Embedding security in collaborative applications. In L. F. Cranor and S. Garfinkel (Eds.) Security and Usability: Designing Secure Systems That People Can Use. O\u2019Reilly Media 607\u2013622. M. E. Zurko. 2005. IBM Lotus Notes\/Domino: Embedding security in collaborative applications. In L. F. Cranor and S. Garfinkel (Eds.) Security and Usability: Designing Secure Systems That People Can Use . O\u2019Reilly Media 607\u2013622."}],"container-title":["Democratizing Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549993.3549997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3549993.3549997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:14Z","timestamp":1750183694000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549993.3549997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,24]]},"ISBN":["9781450398275"],"references-count":93,"alternative-id":["10.1145\/3549993.3549997","10.1145\/3549993"],"URL":"https:\/\/doi.org\/10.1145\/3549993.3549997","relation":{},"subject":[],"published":{"date-parts":[[2022,8,24]]},"assertion":[{"value":"2022-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}