Chaos breeds order

Rambler, Mark; Hayden, Tom; Kwon, Beth
March 1998
Newsweek (Pacific Edition);03/16/98 (Pacific Edition), Vol. 131 Issue 11, p8A
Mentions a data-encryption method created by Georgia Tech researchers Rajarshi Roy and Gregory Van Wiggeren. Use of a laser to hide sensitive data.


Related Articles

  • Selling to Professor Plum, in the library, with a key... van Someren, Alex // Communications News;Mar1998, Vol. 35 Issue 3, p68 

    Discusses various aspects of cryptographic accelerators, a device that installs on or in an electronic commerce service. Tips for choosing with accelerator to buy; Background information on basic encryption techniques; Encryption as a mathematical operation.

  • Too Much Encryption? Suderman, Peter // Reason;Jan2011, Vol. 42 Issue 8, p16 

    The article discusses the U.S. government's policy on data encryption.

  • Tales from the encrypt. Holzmann, Gerard J. // Inc.;1997 Inc. Technology 4, Vol. 19 Issue 17, p168 

    Focuses on the history of encryption devices. Background on the scytale and the wheel cypher; How they worked; Explanation of a dongle.

  • Know the code. Henderson, Rick // Reason;Jun96, Vol. 28 Issue 2, p16 

    Focuses on the dispute between President Bill Clinton's Administration and high-technology companies and privacy advocates over electronic data encryption. Use of Cold War-era regulations for encryption; Introduction of bills that would guarantee the right of Americans to use or sell any...

  • Lack of encryption: Huge losses. Fassett, Anne M.; Bazzy, Jared // Telecommunications - Americas Edition;Dec95, Vol. 29 Issue 12, p20 

    Reports on the use of cryptography by business enterprises in the United States.

  • U.S. cryptography policy: Strategic hamlets. Stapleton-Gray, Ross // Telecommunications - Americas Edition;Jan96, Vol. 30 Issue 1, p29 

    Reports on the availability of encryption techniques in the commercial marketplace in the United States. Announcement of the Clipper chip; Restrictions on encryption exportation.

  • White House relaxes encryption export controls. Weaver, Heather Forsgren // RCR;09/21/98, Vol. 17 Issue 38, p69 

    Reports that the intensity in the controversial encryption export policy has been reduced by the Clinton Administration to allow for strong encryption products to be shipped overseas. What are encryption products; Comments from John Podesta, White House deputy chief of staff; Information on the...

  • Demons, drugs and pornography.  // Network World;08/04/97, Vol. 14 Issue 31, p6 

    Announces the release of the report `Encryption and Evolving Technologies: Tools of Organized Crime and Terrorism,' by the National Strategy and Information Center.

  • SAFE and sound?  // Network World;09/29/97, Vol. 14 Issue 39, p10 

    Reports on the US House of Representatives Commerce Committee's rejection of the Oxley-Manton amendment to the Security and Freedom Through Encryption Act (SAFE) aimed at liberalizing export of products that use encryption. Opposition to the amendment from the software and telecommunications...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics