• access. There are many different cryptography laws in different nations. Some countries prohibit the export of cryptography software and/or encryption algorithms...
    28 KB (3,045 words) - 15:43, 31 October 2024
  • Thumbnail for Cryptography
    Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study"...
    98 KB (10,723 words) - 20:16, 2 November 2024
  • and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines...
    20 KB (1,890 words) - 12:42, 17 October 2024
  • Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
    22 KB (2,846 words) - 07:57, 27 March 2024
  • disclosure laws, also known as mandatory key disclosure, is legislation that requires individuals to surrender cryptographic keys to law enforcement...
    35 KB (3,955 words) - 21:21, 12 September 2024
  • and validity of electronic signatures, including, but not limited to, cryptographic digital signatures, includes: Ley Nº 25.506 (B.O. 14/12/2001). Decreto...
    23 KB (1,847 words) - 23:50, 17 March 2024
  • ElcomSoft (category Cryptography law)
    for DEF CON, was arrested and charged for violating the United States DMCA law by writing ElcomSoft's Advanced eBook Processor software. He was later released...
    6 KB (594 words) - 15:51, 18 September 2024
  • Thumbnail for Illegal number
    Illegal number (category Cryptography law)
    Computer Entertainment v. Hotz case, many bloggers (including one at Yale Law School) made a "new free speech flag" in homage to the AACS free speech flag...
    17 KB (1,658 words) - 13:37, 4 November 2024
  • The export of cryptography is the transfer from one country to another of devices and technology related to cryptography. In the early days of the Cold...
    2 KB (190 words) - 23:55, 8 June 2024
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    48 KB (6,237 words) - 00:38, 5 November 2024
  • Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might...
    51 KB (6,701 words) - 20:35, 29 October 2024
  • Thumbnail for DeCSS
    DeCSS (category Cryptography law)
    DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS,...
    13 KB (1,574 words) - 18:55, 1 July 2024
  • within devices. DRM technologies include licensing agreements and encryption. Laws in many countries criminalize the circumvention of DRM, communication about...
    115 KB (11,206 words) - 23:26, 27 October 2024
  • Thumbnail for Electronic Signatures in Global and National Commerce Act
     464, enacted June 30, 2000, 15 U.S.C. ch. 96) is a United States federal law, passed by the U.S. Congress to facilitate the use of electronic records...
    8 KB (764 words) - 12:28, 12 August 2024
  • Copyright law Corporate law (or company law), also corporate compliance law and corporate governance law Criminal law Cryptography law Cultural property law Custom...
    4 KB (521 words) - 03:35, 11 April 2022
  • Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
    81 KB (9,042 words) - 15:37, 28 October 2024
  • restriction Yellow: License required for importation Red: Total ban Export of cryptography Cryptography and Liberty 1998, GILC Report Crypto-Law survey 2013...
    7 KB (179 words) - 15:22, 3 April 2024
  • Elliptic Curve Digital Signature Algorithm (category Public-key cryptography)
    In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic-curve...
    19 KB (2,833 words) - 03:20, 18 September 2024
  • Thumbnail for Texas Instruments signing key controversy
    Texas Instruments signing key controversy (category Cryptography law)
    Instruments' (TI) response to a project to factorize the 512-bit RSA cryptographic keys needed to write custom firmware to TI devices. In July 2009, Benjamin...
    10 KB (940 words) - 18:45, 1 July 2024
  • Penet remailer (category Cryptography law)
    nation's government in the newsgroup soc.culture.singapore, but as Finnish law did not recognise any crime being committed, Julf was not required to reveal...
    17 KB (1,882 words) - 07:44, 14 June 2024
  • Thumbnail for Regulation of Investigatory Powers Act 2000
    Regulation of Investigatory Powers Act 2000 (category Cryptography law)
    Parliament (MP) for Northampton South, has urged councils to stop using the law, accusing them of acting like comic strip detective Dick Tracy. The Trading...
    41 KB (3,554 words) - 00:39, 16 September 2024
  • Thumbnail for Export of cryptography from the United States
    The export of cryptography from the United States to other countries has experienced various levels of restrictions over time. World War II illustrated...
    21 KB (2,317 words) - 16:00, 28 July 2024
  • Thumbnail for Bruce Schneier
    "kid sister cryptography", writing in the Preface to Applied Cryptography that: There are two kinds of cryptography in this world: cryptography that will...
    27 KB (2,905 words) - 00:00, 1 November 2024
  • Anti–computer forensics (category Cryptography law)
    for investigators, and corroborating results using multiple tools. Cryptographic hash function Data remanence DECAF Degauss Encryption Forensic disk...
    24 KB (2,932 words) - 11:36, 18 May 2024
  • Thumbnail for AACS encryption key controversy
    A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content...
    45 KB (3,958 words) - 15:54, 5 November 2024
  • Government Paperwork Elimination Act (category Cryptography law)
    The Government Paperwork Elimination Act (GPEA, Pub. L. 105–277 (text) (PDF) Title XVII) requires that, when practicable, federal agencies use electronic...
    4 KB (421 words) - 03:12, 11 August 2022
  • The Walsh Report was an Australian cryptography policy review undertaken for the Australian government by Gerard Walsh, initially released in 1996 and...
    11 KB (1,255 words) - 06:55, 28 May 2024
  • Qrpff (category Cryptography law)
    qrpff is a Perl script created by Keith Winstein and Marc Horowitz of the MIT SIPB. It performs DeCSS in six or seven lines. The name itself is an encoding...
    3 KB (488 words) - 23:17, 29 October 2023
  • ECC patents (category Cryptography law)
    Patent-related uncertainty around elliptic curve cryptography (ECC), or ECC patents, is one of the main factors limiting its wide acceptance. For example...
    11 KB (1,214 words) - 04:43, 22 October 2023
  • called Kerckhoffs's desideratum, assumption, axiom, doctrine or law) of cryptography was stated by Dutch-born cryptographer Auguste Kerckhoffs in the...
    15 KB (1,719 words) - 11:26, 27 October 2024