{"title":"密码学的未来","authors":"J. Callas","doi":"10.1080/10658980601051284","DOIUrl":null,"url":null,"abstract":"We’ve seen where cryptography came from, but where is it going? In this article, I pose a number of unsolved problems: challenges that face us with which we have to deal. Some of them are elephants in the room that we’re all ignoring, or if not ignoring we’re noting that they’re in the room, take up a lot of space, and do make it hard to dust, but then we go back to the previous subject. Others are genuinely hard problems without a good solution. Still others are tradeoffs. Consider this a tour of stopoffs at interesting problems and surprising things.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"The Future of Cryptography\",\"authors\":\"J. Callas\",\"doi\":\"10.1080/10658980601051284\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We’ve seen where cryptography came from, but where is it going? In this article, I pose a number of unsolved problems: challenges that face us with which we have to deal. Some of them are elephants in the room that we’re all ignoring, or if not ignoring we’re noting that they’re in the room, take up a lot of space, and do make it hard to dust, but then we go back to the previous subject. Others are genuinely hard problems without a good solution. Still others are tradeoffs. Consider this a tour of stopoffs at interesting problems and surprising things.\",\"PeriodicalId\":36738,\"journal\":{\"name\":\"Journal of Information Systems Security\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Systems Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/10658980601051284\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Systems Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/10658980601051284","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Social Sciences","Score":null,"Total":0}
We’ve seen where cryptography came from, but where is it going? In this article, I pose a number of unsolved problems: challenges that face us with which we have to deal. Some of them are elephants in the room that we’re all ignoring, or if not ignoring we’re noting that they’re in the room, take up a lot of space, and do make it hard to dust, but then we go back to the previous subject. Others are genuinely hard problems without a good solution. Still others are tradeoffs. Consider this a tour of stopoffs at interesting problems and surprising things.