Self Incrimination and Cryptographic Keys
by Greg S. Sergienko
Related Browsing
Know of a site that should be listed here? Send
e-mail to jolt@richmond.edu
and give us the URL and a brief desrciption of the site.
General Cryptography Information
Cryptography
Archive
- On the Cryptography Homepage.
Applied
Cryptography
- by Bruce Schneier - Laymans Bible of Modern Cryptography.
Cryptography
Discussion
- This is a general discussion of cryptography in a non-computer
context.
Cypherpunks
Archives
- Archive of the Cypherpunks newsgroup.
NetSurfer
Focus on Cryptography
The
International PGP Home Page
PGP
Discussion
- This page discusses the ways that encryption keys are distributed
under PGP. It also discusses the "central clearinghouse"
concept of PGP.
Keyless
Encryption Method
Cryptography Regulation
Mark
Eckenwiler's Column
- Further discussion on Cryptography and Self Incrimination.
Cyber
Rant
- This is an article on why cryptography should not be regulated.
Resolving
the Encryption Dilemna: The Case for Clipper
- A discussion of the Clipper chip and its use to encode information.
Association
for Computing Machinery, U.S. Public Policy Committee
- Press Release urging the White House to withdraw the controversial
Clipper Chip encryption proposal.
Cyberwire
Dispatch
- Concerning possible FBI plans to push for legislation for
FBI access to all encrypted information.
Cryptography:
Privacy Maker or Criminal Creator
- By Kevin Craine
Electronic
Frontier Foundation
Copyright
1999 Richmond Journal of Law & Technology