![]() ![]() ![]() (1) AES: A Crypto Algorith for the Twenty-first Century: Advanced Encryption Standard (AES) Development Effort. (2) Wilson, Michael. Considering the Net as an Intelligence Tool. 1996. (3) Burnham, Blaine. Video interview with Grace Agnew. March 17, 2000.
![]() Abelson,
Hal, et al. The Risks of Key Recovery, Key Escrow, Trusted Third Party
& Encryption: A Report by an Ad Hoc Group of Cryptographers and Computer
Scientists. 1998. Anderson,
Ross. Why Cryptosystems Fail. Center for
Democracy & Technology. Fact Sheet: Administraton Implements Updated
Encryption Export Policy. Center for
Democracy & Technology. Major Encryption Legislation: 106th Congress:
Encryption Bill Tracking chart 1999-2000. Codes, Keys
and Conflicts: Issues in U.S. Crypto Policy. CyberLaw:
Cryptography & Speech. Department
of Commerce. Bureau of Export Administration. Revision to Encryption Items.
Interim Final. Request for Comments. RIN: 0694-AC11 on Democracy &
Technology: Encryption. McCullagh,
Declan. "The End of Anonymity?" in Wired. 3/10/00. O'Neil,
Michael J. and James N. Dempsey. Critical Infrastructure Protection: Threats
to Privacy and Other Civil Liberties and Concerns with Government Mandates
on Industry. Center for Democracy & Technology. February 20, 2000.
President's
Working Group on Unlawful Conduct on the Internet. The Electronic Frontier:
the Challenge of Unlawful Conduct Involving the Use of the Internet. Wilson,
Michael. Considering the Net as an Intelligence Tool. 1996. |