
| (1) AES: A Crypto Algorith for the Twenty-first Century: Advanced Encryption Standard (AES) Development Effort. (2) Wilson, Michael. Considering the Net as an Intelligence Tool. 1996. (3) Burnham, Blaine. Video interview with Grace Agnew. March 17, 2000.
Abelson,
Hal, et al. The Risks of Key Recovery, Key Escrow, Trusted Third Party
& Encryption: A Report by an Ad Hoc Group of Cryptographers and Computer
Scientists. 1998. Anderson,
Ross. Why Cryptosystems Fail. Center for
Democracy & Technology. Fact Sheet: Administraton Implements Updated
Encryption Export Policy. Center for
Democracy & Technology. Major Encryption Legislation: 106th Congress:
Encryption Bill Tracking chart 1999-2000. Codes, Keys
and Conflicts: Issues in U.S. Crypto Policy. CyberLaw:
Cryptography & Speech. Department
of Commerce. Bureau of Export Administration. Revision to Encryption Items.
Interim Final. Request for Comments. RIN: 0694-AC11 on Democracy &
Technology: Encryption. McCullagh,
Declan. "The End of Anonymity?" in Wired. 3/10/00. O'Neil,
Michael J. and James N. Dempsey. Critical Infrastructure Protection: Threats
to Privacy and Other Civil Liberties and Concerns with Government Mandates
on Industry. Center for Democracy & Technology. February 20, 2000.
President's
Working Group on Unlawful Conduct on the Internet. The Electronic Frontier:
the Challenge of Unlawful Conduct Involving the Use of the Internet. Wilson,
Michael. Considering the Net as an Intelligence Tool. 1996. |