Crypto Wars

Results: 11



#Item
1Cryptography / Encryption / Key management / Key / Edward Scheidt / ASC X9 / Crypto Wars

X9extra Volume 2, Number 4 AugustCryptography 101

Add to Reading List

Source URL: x9.org

Language: English - Date: 2013-10-16 09:39:15
2Cryptography / Security / Cyberwarfare / Military communications / Mass surveillance / National Security Agency / National security / RSA Security / Crypto Wars / Global surveillance disclosures / Communications security / STU-III

Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail accounts and stealing intellectual

Add to Reading List

Source URL: jnslp.com

Language: English - Date: 2015-03-04 13:43:21
3Cryptography / Crime prevention / National security / Encryption / Computer security / Internet privacy / National Security Agency / End-to-end encryption / Surveillance / Crypto Wars / Export of cryptography from the United States

PDF Document

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-07-05 08:45:24
4Formal sciences / Cryptography / Computer network security / Crime prevention / National security / Exploit / Computer security / Vulnerability / Computing / Security hacker / Theoretical computer science / Computer science

Why Offensive Security Needs Engineering Textbooks or, how to avoid a replay of “crypto wars” in security research Sergey Bratus, Iv´an Arce, Michael E. Locasto, Stefano Zanero August 22, 2014 Offensive security—o

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2014-08-22 21:44:16
5Cryptography / Security / Cyberwarfare / Clipper chip / Key escrow / Crypto Wars / Computer security / Strong cryptography / National Security Agency / Escrow / Encryption / Secure communication

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
6Cryptography / Email authentication / Cryptographic software / Mass surveillance / Internet privacy / Crypto Wars / Email encryption / Encryption / End-to-end encryption / BitLocker / National Security Agency / Surveillance

Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

Add to Reading List

Source URL: cyber.law.harvard.edu

Language: English - Date: 2016-01-31 21:23:48
7Mass surveillance / National Security Agency / United States government secrecy / Bullrun / RSA Security / Global surveillance disclosures / RSA BSAFE / IPsec / Elliptic curve cryptography / Cryptography / Dual EC DRBG / Crypto Wars

Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2015-03-10 15:36:10
8

Danielle Kehl, Andi Wilson, and Kevin Bankston DOOMED TO REPEAT HISTORY? LESSONS FROM THE CRYPTO WARS OF THE 1990S June 2015

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-06-18 18:00:17
    9Cryptography / Clipper chip / Key escrow / Crypto Wars / Computer security / Escrow / Strong cryptography / Encryption / Secure communication / National Security Agency / Astro / Key

    Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRJuly 6, 2015

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2015-07-09 08:43:04
    10

    OPINION Why Offensive Security Needs Engineering Textbooks Or, How to Avoid a Replay of “Crypto Wars” in Security Research

    Add to Reading List

    Source URL: www.usenix.org

      UPDATE