Tag: 1990s
- A Cryptography Policy Framework for Electronic Commerce: Building Canada's Information Economy and Society
- A Flawed Encryption Policy
- A Flawed Encryption Policy
- A “Stumbling” US Encryption Policy
- Another Faulty Encryption Policy
- Bernstein v. Dept of Justice
- Bernstein v. US Dept. of State (Bernstein I)
- Bernstein v. US Dept. of State (Bernstein II)
- Bernstein v. US Dept. of State (Bernstein III) 974 F. Supp. 1288 (N.D. Cal. 1997)(Bernstein III)
- Bureau of Export Administration Annual Report 1998
- Clinton Administration Encryption Policy Statement \& Press Briefing
- Clinton Removes Export Limits on Encryption Technology
- Coalition Letter of Law Professors to Hon. Thomas J. Biley Regarding SAFE Amendments
- Coalition Letter of Law Professors to Hon. Thomas J. Biley Regarding SAFE Amendments
- Complete ACM Columns Collection
- Cracking DES: Secrets of Encryption Research, Wiretap Politics \& Chip Design. How Federal Agencies Subvert Privacy
- Cryptography's Role in Securing the Information Society
- Daniel J. Bernstein v. U.S. Department of State
- Demystifying U.S. Encryption Export Controls
- Demystifying U.S. Encryption Export Controls
- Doomed to Repeat History? Lessons from the Crypto Wars of the 1990s
- Efforts to Ban Encryption in the 1990s
- Efforts to Ban Encryption in the 1990s
- Encryption and the First Amendment
- Encryption Control 'Unconstitutional'
- Encryption Export Controls
- Encryption Policy a Crowd Pleaser
- Encryption Policy for the 21st Century: A Future Without Government-Prescribed Key Recovery
- Encryption policy — A UK perspective
- Encryption: A 21st Century National Security Dilemma
- Executive Order 13026 - Administration of Export Controls on Encryption Products
- FAQ on the FCC CALEA Expansion
- First and Fifth Amendment Challenges to Export Controls on Encryption: Bernstein and Karn
- From Clipper Chip to Smartphones: Unlocking the Encryption Debate
- GAO Report on Communications Privacy
- Information Security and Privacy in Network Environments
- International Human Rights Organizations Express Privacy Concerns About Canadian Cryptography Policy
- It Came from Planet Clipper: The Battle Over Cryptographic Key "Escrow"
- Key Escrow
- Key Escrow from a Safe Distance: Looking Back at the Clipper Chip
- OECD Guidelines for Cryptography Policy
- Recommendation of the Council Concerning Guidelines for Cryptography Policy (adopted by the Council at its 895th session on 27 March 1997 [C/M(97)6/PROV])
- S. 266 - Comprehensive Counter-Terrorism Act of 1991
- Secrets or Shields to Share? New Dilemmas for Dual Use Technology Development and the Quest for military and Commercial Advantage in the Digital Age
- Software Firms Call U.S. Plan on Encryption 'Unworkable'
- Standards Setting and Federal Information Policy: The Escrowed Encryption Standard (EES)
- Statement by Commerce Secretary William Daley Re: Administration encryption policy
- Statement by the Press Secretary
- Statement of Cindy A. Cohn, Testimony on Encryption as Constitutionally Protected Speech
- Statement of Cindy A. Cohn, Testimony on Encryption as Constitutionally Protected Speech
- Symposium: Recent Development: Key Escrow Encryption Policies and Technoligies
- Testimony of Cindy Cohn before the Subcommittee on Constitution, Federalism, and Property Rights
- The Clipper Chip
- The Evolution of US Government Restrictions on Using and Exporting Encryption Technologies (U)
- The Metaphor is the Key: Cryptography, The Clipper Chip, and the Constitution
- The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption (Revised)
- The Wassenaar Arrangement: On Export Controls for Conventional Arms and Dual-Use Goods and Technologies
- Timeline: The U.S. Government and Cybersecurity
- U.S. Relaxes Export Controls on Supercomputers
- U.S. Supercomputer Export Control Policy
- Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies
- What is the Wassenaar Arrangement?