1 |
PUB, NIST FIPS. "46-3. Data Encryption Standard." Federal Information Processing Standards, National Bureau of Standards, US Department of Commerce (1977).
|
2 |
Diffie, Whitfield. "New direction in cryptography." IEEE Trans. Inform. Theory 22 (1976): pp. 472-492.
|
3 |
Campbell, Ryan. "Brademas Intern August 18, 2019 Keeping it Cryptic: The Enduring Debate on Privacy and Lawful Access On July 23, at the International Conference on Cyber Security in New York City." (2019).
|
4 |
OECD legal instrument, "Recommendation of the Council OECD Legal Instruments concerning Guidelines for Cryptography Policy" Workshop on Cryptography Policy, Paris, 1997
|
5 |
Schulze, Matthias. "Clipper meets Apple vs. FBI: a comparison of the cryptography discourses from 1993 and 2016." Media and Communication 5.1 (2017): pp. 54-62.
DOI
|
6 |
Segell, Glen M. "French cryptograph policy: The turnabout of 1999." International Journal of Intelligence and CounterIntelligence 13.3 (2000): pp. 345-358.
DOI
|
7 |
Saper, Nathan. "International cryptography regulation and the global information economy." Nw. J. Tech. & Intell. Prop. 11 (2012): xv.
|
8 |
Baker, Stewart A. "Decoding OECD Guidlines for Cryptography Policy." Int'l L.. Vol. 31. 1997.
|
9 |
Herson, David. "The Changing Face of International Cryptography Policy: Part 20-OECD Security Guidelines." Computer Fraud & Security 2001.9 (2001): pp. 8-9.
DOI
|
10 |
Hyun Joe Kwon, Kilsoo Chun, Jae-il Lee "Current status of domestic and foreign Cryptography legal and Polices." Korea Institute Of Information Security And Cryptology 15.2 (2005): pp. 37-53.
|
11 |
Korea Information Protection Center, "A Study on the Cryptographic Use Policy in the Domestic Private Sector" Technical Policy Study, 1998.12.
|
12 |
Davies, Donald. "A brief history of cryptography." Information Security Technical Report 2.2 (1997): pp. 14-17.
DOI
|
13 |
Sook-yeon Lee. "Search and Seizure, Fundamental Rights, and Doctrine of Warrants Concerning Electronic Information" constitutional studies 18 (2012): pp. 1-44.
|
14 |
Hee Won, Han, "A Legal Study on The Intelligence/Investigation Combination Phenomena According to The Security Paradigms Shift After Cold War Era - From Warfighting To Crimefighting" Korean Association of Laws study of law 2017.6.
|
15 |
Chosun Ilbo "'Cho Ju-bin's cell phone password was released in two months." (2020. 5. 15.) https://news.mt.co.kr/mtview.php?no=2020051511022977954
|
16 |
Lin, Herbert S. "Cryptography and public policy." Journal of Government Information 25.2 (1998): pp. 135-148.
DOI
|