• Thumbnail for Export of cryptography from the United States
    The export of cryptography from the United States to other countries has experienced various levels of restrictions over time. World War II illustrated...
    21 KB (2,333 words) - 20:14, 24 May 2025
  • The export of cryptography is the transfer from one country to another of devices and technology related to cryptography. In the early days of the Cold...
    2 KB (190 words) - 23:55, 8 June 2024
  • Legion of the Bouncy Castle Inc. Bouncy Castle is Australian in origin and therefore American restrictions on the export of cryptography from the United States...
    9 KB (1,079 words) - 22:38, 29 August 2024
  • Crypto Wars (redirect from The Crypto Wars)
    the United States Munitions List. The multinational control of the export of cryptography on the Western side of the cold war divide was done via the...
    37 KB (4,098 words) - 16:28, 10 May 2025
  • Thumbnail for Daniel J. Bernstein
    Daniel J. Bernstein (category Academic staff of the Eindhoven University of Technology)
    mathematics from the University of California, Berkeley (1995), where he studied under Hendrik Lenstra. The export of cryptography from the United States was...
    22 KB (1,938 words) - 20:58, 26 May 2025
  • challenge to the restrictions on the export of cryptography from the United States. Junger v. Daley DeCSS Phil Zimmermann - Arms Export Control Act investigation...
    20 KB (1,901 words) - 07:15, 23 January 2025
  • Thumbnail for Cryptography
    from the original on 26 September 2018. Retrieved 26 March 2015. ".4 United States Cryptography Export/Import Laws". RSA Laboratories. Archived from the...
    99 KB (10,975 words) - 18:31, 26 May 2025
  • forbidding the export of cryptographic software containing certain strong encryption algorithms (see Export of cryptography from the United States). These...
    178 KB (17,517 words) - 09:45, 16 May 2025
  • access. There are many different cryptography laws in different nations. Some countries prohibit the export of cryptography software and/or encryption algorithms...
    28 KB (3,046 words) - 13:57, 26 May 2025
  • Thumbnail for Bernstein v. United States
    the export of cryptographic software. In the early 1990s, the U.S. government classified encryption software as a "munition," imposing strict export controls...
    8 KB (703 words) - 13:59, 28 April 2025
  • Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
    22 KB (2,846 words) - 19:45, 6 February 2025
  • NSAKEY (category History of cryptography)
    denied the speculation and said that the key's name came from the fact that NSA was the technical review authority for U.S. cryptography export controls...
    14 KB (1,480 words) - 10:18, 19 May 2025
  • It was created in response to United States federal legislation on the export of strong cryptography in the 1990s. The legislation had limited encryption...
    5 KB (533 words) - 02:03, 18 March 2025
  • Thumbnail for Videocipher
    restrictions on export of cryptography from the United States because of its use of DES, but an exception for consumer descramblers was added to the US Munitions...
    13 KB (1,697 words) - 21:05, 29 October 2023
  • Thumbnail for Arms Export Control Act
    gives the President of the United States the authority to control the import and export of defense articles and defense services. The H.R. 13680 legislation...
    20 KB (1,903 words) - 00:01, 22 January 2025
  • Executive Order 13026 (category Short description is different from Wikidata)
    Export of cryptography from the United States...
    404 bytes (7 words) - 09:43, 28 November 2024
  • speech and the transfer of cryptographic regulatory authority from the U.S. State Department to the more pro-export Commerce Department, the restrictions...
    5 KB (648 words) - 00:12, 26 March 2025
  • Cryptography, the use of codes and ciphers, began thousands of years ago. Until recent decades, it has been the story of what might be called classical...
    53 KB (6,893 words) - 16:19, 30 May 2025
  • 40-bit encryption (category History of cryptography)
     615. University of California at Berkeley Public Information Office (January 29, 1997). "The only legally exportable cryptography level is totally insecure;...
    5 KB (668 words) - 21:50, 13 August 2024
  • department. The United States has had export controls since the American Revolution, although the modern export control regimes can be traced back to the Trading...
    20 KB (2,144 words) - 20:51, 15 May 2025
  • Thumbnail for J. Alex Halderman
    J. Alex Halderman (category University of Michigan faculty)
    versions of the protocol had been deliberately weakened due to 1990s-era restrictions on the export of cryptography from the United States, they carried...
    28 KB (2,736 words) - 05:10, 8 May 2025
  • Fetterlein • eSTREAM • Étienne Bazeries • Eurocrypt • EuroCrypt • Export of cryptography • Extensible Authentication Protocol Fast Software Encryption •...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • about the export of cryptographic software containing certain strong encryption algorithms (see Export of cryptography from the United States). These weak...
    135 KB (4,833 words) - 13:14, 18 March 2025
  • of 1954 Born secret Classified information in the United States Defense Office of Prepublication and Security Review Export of cryptography from the United...
    37 KB (3,224 words) - 22:39, 13 May 2025
  • Cypherpunk (category Articles with unsourced statements from January 2023)
    advocates the widespread use of strong cryptography and privacy-enhancing technologies as a means of effecting social and political change. The cypherpunk...
    52 KB (5,439 words) - 03:24, 26 May 2025
  • Kerberos (protocol) (category Massachusetts Institute of Technology software)
    symmetric-key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication...
    27 KB (3,023 words) - 15:26, 31 May 2025
  • Below is a timeline of notable events related to cryptography. 36th century – The Sumerians develop cuneiform writing and the Egyptians develop hieroglyphic...
    16 KB (2,012 words) - 23:08, 28 January 2025
  • Pretty Good Privacy (category History of cryptography)
    in the Bernstein case and the Sixth Circuit Court of Appeals in the Junger case). US export regulations regarding cryptography remain in force, but were...
    57 KB (6,317 words) - 01:27, 30 May 2025
  • The Export Control Act of 1940 was one in a series of legislative efforts by the US government and initially the administration of President Franklin D...
    12 KB (1,557 words) - 14:50, 26 February 2025
  • Thumbnail for Phil Zimmermann
    Phil Zimmermann (category American people of German descent)
    Export Control Act. The United States Government had long regarded cryptographic software as a munition, and thus subject to arms trafficking export controls...
    15 KB (1,478 words) - 09:06, 22 April 2025