Tag: Crypto Wars
- A Flawed Encryption Policy
- A Roadmap for Exceptional Access Research
- A “Stumbling” US Encryption Policy
- Another Faulty Encryption Policy
- Bernstein v. U.S. Department of State
- Bureau of Export Administration Annual Report 1998
- Clinton Administration Encryption Policy Statement \& Press Briefing
- Clinton Removes Export Limits on Encryption Technology
- Coalition Letter of Law Professors to Hon. Thomas J. Biley Regarding SAFE Amendments
- Complete ACM Columns Collection
- Congress Mulls Stiff Crypto Laws
- Cracking DES: Secrets of Encryption Research, Wiretap Politics \& Chip Design. How Federal Agencies Subvert Privacy
- CRS Report for Congress: Encryption Export Controls
- Disputes on Electronic Message Encryption Take on New Urgency
- Doomed to Repeat History? Lessons from the Crypto Wars of the 1990s
- Efforts to Ban Encryption in the 1990s
- Encryption and Globalization
- Encryption and the Press Clause
- Encryption Policy for the 21st Century: A Future Without Government-Prescribed Key Recovery
- EPIC Key Escrow Page
- GAO Report on Communications Privacy
- Information Security and Privacy in Network Environments
- Key Escrow from a Safe Distance: Looking Back at the Clipper Chip
- Revision to Encryption Items - Bureau of Export Administration
- Senator Backs Off Backdoors
- Standards Setting and Federal Information Policy: The Escrowed Encryption Standard (EES)
- Symposium: Recent Development: Key Escrow Encryption Policies and Technoligies
- Techies Urge Senator To Drop Encryption Key Plan
- Testimony on Encryption as Constitutionally Protected Speech
- The Metaphor is the Key: Cryptography, The Clipper Chip, and the Constitution
- The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
- U.S. Supercomputer Export Control Policy
- White House Clipper Statement (4/16/93)
- Wiretapping and Cryptography Today