Keys under doormats

Mandating insecurity by requiring government access to all data and communications.

[1]  James B. Comey Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course? [presentation] , 2014 .

[2]  Gavin Lowe,et al.  An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..

[3]  Alfredo Pironti,et al.  A Messy State of the Union: Taming the Composite State Machines of TLS , 2015, 2015 IEEE Symposium on Security and Privacy.

[4]  Diomidis Spinellis,et al.  The Athens Affair , 2007, IEEE Spectrum.

[5]  Peter G. Neumann,et al.  The risks of key recovery, key escrow, and trusted third-party encryption , 1997, World Wide Web J..

[6]  Tom Cross Exploiting Lawful Intercept to Wiretap the Internet , 2010 .

[7]  Whitfield Diffie,et al.  The export of cryptography in the 20th century and the 21st , 2001 .

[8]  R. Brooks,et al.  Computer Science and Artificial Intelligence Laboratory , 2005 .

[9]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[10]  Herbert S. Lin,et al.  Cryptography's Role in Securing the Information Society (Роль криптографии в защите информационного общества) , 1996 .

[11]  William J. Lynn,et al.  Defending a New Domain: The Pentagon's Cyberstrategy , 2010 .

[12]  Susan Landau,et al.  Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition , 1998 .

[13]  Matt Blaze,et al.  Protocol failure in the escrowed encryption standard , 1994, CCS '94.