Academic Appointments


Journal Articles


  • How risky is nuclear optimism? BULLETIN OF THE ATOMIC SCIENTISTS Hellman, M. E. 2011; 67 (2): 47-56
  • RESPONSES TO NISTS PROPOSAL COMMUNICATIONS OF THE ACM Rivest, R. L., HELLMAN, M. E., Anderson, J. C., Lyons, J. W. 1992; 35 (7): 41-54
  • TIME MEMORY PROCESSOR TRADE-OFFS IEEE TRANSACTIONS ON INFORMATION THEORY AMIRAZIZI, H. R., HELLMAN, M. E. 1988; 34 (3): 505-512
  • SCIENTISTS MUST HELP STOP THE ARMS-RACE (REPRINTED FROM BREAKTHROUGH EMERGING NEW THINKING, 1988) SCIENTIST Kapitza, S. P., HELLMAN, M. E. 1988; 2 (2): 22-22
  • ON SECRET SHARING SYSTEMS IEEE TRANSACTIONS ON INFORMATION THEORY KARNIN, E. D., Greene, J. W., HELLMAN, M. E. 1983; 29 (1): 35-41
  • ANOTHER CRYPTANALYTIC ATTACK ON A CRYPTOSYSTEM FOR MULTIPLE COMMUNICATION INFORMATION PROCESSING LETTERS HELLMAN, M. E. 1981; 12 (4): 182-183
  • REPORT OF THE PUBLIC CRYPTOGRAPHY STUDY-GROUP ACADEME-BULLETIN OF THE AAUP Baum, W. A., Heyman, I. M., BRANDIN, D. H., Buck, R. C., DAVIDA, G. I., Handelman, G., HELLMAN, M. E., Kaplan, W., Schwartz, D. C. 1981; 67 (6): 372-379
  • A CRYPTANALYTIC TIME-MEMORY TRADE-OFF IEEE TRANSACTIONS ON INFORMATION THEORY HELLMAN, M. E. 1980; 26 (4): 401-406
  • PRIVACY AND AUTHENTICATION - INTRODUCTION TO CRYPTOGRAPHY PROCEEDINGS OF THE IEEE Diffie, W., HELLMAN, M. E. 1979; 67 (3): 397-427
  • FOILING COMPUTER CRIME .1. DES WILL BE TOTALLY INSECURE WITHIN 10 YEARS IEEE SPECTRUM HELLMAN, M. E. 1979; 16 (7): 32-39
  • MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY SCIENTIFIC AMERICAN HELLMAN, M. E. 1979; 241 (2): 146-?
  • HIDING INFORMATION AND SIGNATURES IN TRAPDOOR KNAPSACKS IEEE TRANSACTIONS ON INFORMATION THEORY Merkle, R. C., HELLMAN, M. E. 1978; 24 (5): 525-530
  • GAUSSIAN WIRE-TAP CHANNEL IEEE TRANSACTIONS ON INFORMATION THEORY LEUNGYANCHEONG, S. K., HELLMAN, M. E. 1978; 24 (4): 451-456
  • EXHAUSTIVE CRYPT-ANALYSIS OF NBS DATA ENCRYPTION STANDARD COMPUTER Diffie, W., HELLMAN, M. E. 1977; 10 (6): 74-84
  • EXTENSION OF SHANNON THEORY APPROACH TO CRYPTOGRAPHY IEEE TRANSACTIONS ON INFORMATION THEORY HELLMAN, M. E. 1977; 23 (3): 289-294
  • CONCERNING A BOUND ON UNDETECTED ERROR PROBABILITY IEEE TRANSACTIONS ON INFORMATION THEORY LEUNGYANCHEONG, S. K., HELLMAN, M. E. 1976; 22 (2): 235-237
  • OPTIMAL FINITE MEMORY LEARNING ALGORITHMS FOR FINITE SAMPLE PROBLEM INFORMATION AND CONTROL COVER, T. M., Freedman, M. A., HELLMAN, M. E. 1976; 30 (1): 49-85
  • NEW DIRECTIONS IN CRYPTOGRAPHY IEEE TRANSACTIONS ON INFORMATION THEORY Diffie, W., HELLMAN, M. E. 1976; 22 (6): 644-654
  • TREE CODING WITH A FIDELITY CRITERION IEEE TRANSACTIONS ON INFORMATION THEORY DAVIS, C. R., HELLMAN, M. E. 1975; 21 (4): 373-378
  • BISTABLE BEHAVIOR OF ALOHA-TYPE SYSTEMS IEEE TRANSACTIONS ON COMMUNICATIONS CARLEIAL, A. B., HELLMAN, M. E. 1975; CO23 (4): 401-410
  • CONVOLUTIONAL SOURCE ENCODING IEEE TRANSACTIONS ON INFORMATION THEORY HELLMAN, M. E. 1975; 21 (6): 651-656