Crypto Wars

Results: 11



#Item
1X9extra  Volume 2, Number 4 AugustCryptography 101

X9extra Volume 2, Number 4 AugustCryptography 101

Add to Reading List

Source URL: x9.org

Language: English - Date: 2013-10-16 09:39:15
2Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail accounts and stealing intellectual

Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail accounts and stealing intellectual

Add to Reading List

Source URL: jnslp.com

Language: English - Date: 2015-03-04 13:43:21
3

PDF Document

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-07-05 08:45:24
4Why Offensive Security Needs Engineering Textbooks or, how to avoid a replay of “crypto wars” in security research Sergey Bratus, Iv´an Arce, Michael E. Locasto, Stefano Zanero August 22, 2014 Offensive security—o

Why Offensive Security Needs Engineering Textbooks or, how to avoid a replay of “crypto wars” in security research Sergey Bratus, Iv´an Arce, Michael E. Locasto, Stefano Zanero August 22, 2014 Offensive security—o

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2014-08-22 21:44:16
5Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
6Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

Add to Reading List

Source URL: cyber.law.harvard.edu

Language: English - Date: 2016-01-31 21:23:48
7Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2015-03-10 15:36:10
8Danielle Kehl, Andi Wilson, and Kevin Bankston  DOOMED TO REPEAT HISTORY? LESSONS FROM THE CRYPTO WARS OF THE 1990S June 2015

Danielle Kehl, Andi Wilson, and Kevin Bankston DOOMED TO REPEAT HISTORY? LESSONS FROM THE CRYPTO WARS OF THE 1990S June 2015

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-06-18 18:00:17
    9Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRJuly 6, 2015

    Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRJuly 6, 2015

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2015-07-09 08:43:04
    10OPINION  Why Offensive Security Needs Engineering Textbooks  Or, How to Avoid a Replay of “Crypto Wars” in Security Research

    OPINION Why Offensive Security Needs Engineering Textbooks Or, How to Avoid a Replay of “Crypto Wars” in Security Research

    Add to Reading List

    Source URL: www.usenix.org