jkimble@crash.CTS.COM (Jim Kimble) (07/07/87)
Here's that information I promised a long time ago, but never got around
to sending. I was suddenly over-wealmed by guilt and a lot of free time.
Enjoy.
--Jim Kimble
jkimble@crash.cts.com
Encryption: technology, privacy, and national security. (confidentiality of
electronic communications) by Tom Athanasiou il Technology Review
v85-Aug-Sep 1986, p56(10)
Can the world agree on the next digital-speech coding algorithm? (voiceband
codig standization) defferential pulse-code modulation) by William G. Schmidt
il Data Communications v15-July 1986 p157(6)
Four sime encryption techniques help ensure data integrity. By Louis R. Mills
il Data Management v22-Dec 1984 p22(2)
Data-encoding technique boosts drive capacity (data disk drives; includes
article on data-encoding methods) by Steve Rosenthal PC Week v3-May 20, 1986
The destiny of DES (data encryption standard) by Robert G. Andersen il
Datamation v33-March 1 1987
Encryption: technology, privacy, and national security (confidentiality of
electronic communications) by Tom Athanasiou il Technology Review
v89-Aug-Sept 1986 p56(10)
Uncommon factoring; new computing machines and new algorithms are speeding up
the factoring of large numbers. By Ivars Peterson il Science News v127-March
30, 1985 p202(2)
Shredded knapsack (cryptography innovations) Scientific American v252-Jan 1985
p56(2)
Scientist cracks knapsack public key code. By John Desmond ComputerWorld
v18-Dec 3, 1984 p2(1)
The unpacking of a knapsack (encrypted messages based on a mathematical
puzzle)
by Ivars Peterson il Science News v126-Nov 24, 1984 p330(2)
Implementing cryptographic algorithms on microcomputers; create up to
200-digit
keys. By Charles Klupfel Byte v9-Oct 1984 p126(11)
The ciphers of Edgar Allan Poe. (deciphering coded messages) il Science
Digest v92-Oct 1984 p62(4)
Encryption decyphered; oding locks your data away frm anyone not possessing
te key. By Carl Micolai il Computers & Electronics v22-June 1984 p64(5)
Keeping electronic mail private. By Vin McLellan il Inc. v6-April 1984
p37(3)
Deciphering word games; two Basic programs that will help you solve
cryptograms
nd anagrams. By Mark C. Worlay Byte v9-Feb 1984 p383(3)
Nongovernmental cryptology and national security: the government seeking to
restrict research. By Christy Brad Escober Computer-Law Journal 4-Wntr-1984
p573-603
(DECODERS AND OTHER RELATED STUFF)
Build a hardware data encryptor (cpmputer data security) by Steve Ciarcia il
Byte v11-Sept 1986 p97(15)
Decoders in use up to 41% (scrambling decoders) Television Digest v26-Nov 1986
p5(1)
French pay-TV Company loses decoder suit, OK to steal signal. By Bob Jaques
Variety v326-March.
'Superchips' in decoder black market. Television Digest v26-Dec 22, 1986
p3(1).
PUBLIC Key Encryption System, v2.00 (computer program)
Three products help cork computer leaks; feature blocked access, disk-file
encryption. (evaluation) by Winn Rosche. PC Week v2-May 7, 1985. p122(3)
--Jim Kimble
"We can do that. We don't even need a reason." -- Bill Murray, Caddyshack
UUCP: {akgua, hplabs!hp-sdd, sdcsvax, nosc}!crash!jkimble
ARPA: crash!jkimble@nosc
INET: jkimble@crash.CTS.COM