(1) AES: A Crypto Algorith for the Twenty-first Century: Advanced Encryption Standard (AES) Development Effort.

(2) Wilson, Michael. Considering the Net as an Intelligence Tool. 1996.

(3) Burnham, Blaine. Video interview with Grace Agnew. March 17, 2000.

 


Abelson, Hal, et al. The Risks of Key Recovery, Key Escrow, Trusted Third Party & Encryption: A Report by an Ad Hoc Group of Cryptographers and Computer Scientists. 1998.
http://www.cdt.org/crypto/risks98/

Anderson, Ross. Why Cryptosystems Fail.
http://www.info-sec.com/crypto/99/crypto_060899c_j.shtml

Center for Democracy & Technology. Fact Sheet: Administraton Implements Updated Encryption Export Policy.
http://www.cdt.org/crypto/admin/000112commercefactsheet.shtml

Center for Democracy & Technology. Major Encryption Legislation: 106th Congress: Encryption Bill Tracking chart 1999-2000.
http://www.cdt.org/crypto/legis_106/

Codes, Keys and Conflicts: Issues in U.S. Crypto Policy.
http://www.acm.org/reports/acm_crypto_study

CyberLaw: Cryptography & Speech.
http://www.cyberlaw.com/cylw1095.html

Department of Commerce. Bureau of Export Administration. Revision to Encryption Items. Interim Final. Request for Comments. RIN: 0694-AC11 on Democracy & Technology: Encryption.
http://www.cdt.org/crypto/admin/000110cryptoregs.shtml

McCullagh, Declan. "The End of Anonymity?" in Wired. 3/10/00.
http://www.infowar.com/class_1/00/class1_031000a_j.shtml

O'Neil, Michael J. and James N. Dempsey. Critical Infrastructure Protection: Threats to Privacy and Other Civil Liberties and Concerns with Government Mandates on Industry. Center for Democracy & Technology. February 20, 2000.
http://www.cdt.org/policy/terrorism/oneildempseymemo.html

President's Working Group on Unlawful Conduct on the Internet. The Electronic Frontier: the Challenge of Unlawful Conduct Involving the Use of the Internet.
http://www.politechbot.com/docs/unlawfulconduct.txt

Wilson, Michael. Considering the Net as an Intelligence Tool. 1996.
http://www.fas.org.cp/eprint96/inttool.htm