The export of cryptography from the United States to other countries has experienced various levels of restrictions over time. World War II illustrated...
21 KB (2,333 words) - 20:14, 24 May 2025
The export of cryptography is the transfer from one country to another of devices and technology related to cryptography. In the early days of the Cold...
2 KB (190 words) - 23:55, 8 June 2024
Legion of the Bouncy Castle Inc. Bouncy Castle is Australian in origin and therefore American restrictions on the export of cryptography from the United States...
9 KB (1,079 words) - 22:38, 29 August 2024
Crypto Wars (redirect from The Crypto Wars)
the United States Munitions List. The multinational control of the export of cryptography on the Western side of the cold war divide was done via the...
37 KB (4,098 words) - 16:28, 10 May 2025
Daniel J. Bernstein (category Academic staff of the Eindhoven University of Technology)
mathematics from the University of California, Berkeley (1995), where he studied under Hendrik Lenstra. The export of cryptography from the United States was...
22 KB (1,938 words) - 20:58, 26 May 2025
challenge to the restrictions on the export of cryptography from the United States. Junger v. Daley DeCSS Phil Zimmermann - Arms Export Control Act investigation...
20 KB (1,901 words) - 07:15, 23 January 2025
from the original on 26 September 2018. Retrieved 26 March 2015. ".4 United States Cryptography Export/Import Laws". RSA Laboratories. Archived from the...
99 KB (10,975 words) - 18:31, 26 May 2025
Transport Layer Security (redirect from Security of Transport Layer Security)
forbidding the export of cryptographic software containing certain strong encryption algorithms (see Export of cryptography from the United States). These...
178 KB (17,517 words) - 09:45, 16 May 2025
access. There are many different cryptography laws in different nations. Some countries prohibit the export of cryptography software and/or encryption algorithms...
28 KB (3,046 words) - 13:57, 26 May 2025
the export of cryptographic software. In the early 1990s, the U.S. government classified encryption software as a "munition," imposing strict export controls...
8 KB (703 words) - 13:59, 28 April 2025
Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
22 KB (2,846 words) - 19:45, 6 February 2025
NSAKEY (category History of cryptography)
denied the speculation and said that the key's name came from the fact that NSA was the technical review authority for U.S. cryptography export controls...
14 KB (1,480 words) - 10:18, 19 May 2025
It was created in response to United States federal legislation on the export of strong cryptography in the 1990s. The legislation had limited encryption...
5 KB (533 words) - 02:03, 18 March 2025
restrictions on export of cryptography from the United States because of its use of DES, but an exception for consumer descramblers was added to the US Munitions...
13 KB (1,697 words) - 21:05, 29 October 2023
gives the President of the United States the authority to control the import and export of defense articles and defense services. The H.R. 13680 legislation...
20 KB (1,903 words) - 00:01, 22 January 2025
Executive Order 13026 (category Short description is different from Wikidata)
Export of cryptography from the United States...
404 bytes (7 words) - 09:43, 28 November 2024
speech and the transfer of cryptographic regulatory authority from the U.S. State Department to the more pro-export Commerce Department, the restrictions...
5 KB (648 words) - 00:12, 26 March 2025
Cryptography, the use of codes and ciphers, began thousands of years ago. Until recent decades, it has been the story of what might be called classical...
53 KB (6,893 words) - 16:19, 30 May 2025
40-bit encryption (category History of cryptography)
615. University of California at Berkeley Public Information Office (January 29, 1997). "The only legally exportable cryptography level is totally insecure;...
5 KB (668 words) - 21:50, 13 August 2024
department. The United States has had export controls since the American Revolution, although the modern export control regimes can be traced back to the Trading...
20 KB (2,144 words) - 20:51, 15 May 2025
J. Alex Halderman (category University of Michigan faculty)
versions of the protocol had been deliberately weakened due to 1990s-era restrictions on the export of cryptography from the United States, they carried...
28 KB (2,736 words) - 05:10, 8 May 2025
Fetterlein • eSTREAM • Étienne Bazeries • Eurocrypt • EuroCrypt • Export of cryptography • Extensible Authentication Protocol Fast Software Encryption •...
67 KB (2,932 words) - 23:20, 16 May 2025
about the export of cryptographic software containing certain strong encryption algorithms (see Export of cryptography from the United States). These weak...
135 KB (4,833 words) - 13:14, 18 March 2025
Invention Secrecy Act (redirect from Invention Secrecy Act of 1951)
of 1954 Born secret Classified information in the United States Defense Office of Prepublication and Security Review Export of cryptography from the United...
37 KB (3,224 words) - 22:39, 13 May 2025
Cypherpunk (category Articles with unsourced statements from January 2023)
advocates the widespread use of strong cryptography and privacy-enhancing technologies as a means of effecting social and political change. The cypherpunk...
52 KB (5,439 words) - 03:24, 26 May 2025
Kerberos (protocol) (category Massachusetts Institute of Technology software)
symmetric-key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication...
27 KB (3,023 words) - 15:26, 31 May 2025
Below is a timeline of notable events related to cryptography. 36th century – The Sumerians develop cuneiform writing and the Egyptians develop hieroglyphic...
16 KB (2,012 words) - 23:08, 28 January 2025
Pretty Good Privacy (category History of cryptography)
in the Bernstein case and the Sixth Circuit Court of Appeals in the Junger case). US export regulations regarding cryptography remain in force, but were...
57 KB (6,317 words) - 01:27, 30 May 2025
The Export Control Act of 1940 was one in a series of legislative efforts by the US government and initially the administration of President Franklin D...
12 KB (1,557 words) - 14:50, 26 February 2025
Phil Zimmermann (category American people of German descent)
Export Control Act. The United States Government had long regarded cryptographic software as a munition, and thus subject to arms trafficking export controls...
15 KB (1,478 words) - 09:06, 22 April 2025