1. Abelson H. R. Anderson S. M. Bellovin J. Benaloh M. Blaze W. Diffie J. Gilmore et al. “The Risks of Key Recovery Key Escrow and Trusted Third-Party Encryption.” 27 May 1997. https://web.archive.org/web/20210125182103/http://groups.csail.mit.edu/mac/classes/6.805/articles/crypto/key-study-report.html.
2. Advanced Telephony Unit Federal Bureau of Investigation. “Impact of Emerging Telecommunications Technology on Law Enforcement.” Columbia University 1992. https://web.archive.org/web/20200716170720/https://www.cs.columbia.edu/~smb/Telecommunications_Overview_1992.pdf.
3. Aldrich, R. J. GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency. London: Harper Press, 2019.
4. Andrews E. L. “Europeans Reject U.S. Plan on Electronic Cryptography.” The New York Times. 9 October 1997. https://web.archive.org/web/20190713223119/https://www.nytimes.com/1997/10/09/business/international-business-europeans-reject-us-plan-on-electronic-cryptography.html.
5. Apple A. and others. “Joint Press Announcement: High-Tech Leaders Join Forces to Enable International Strong Encryption.” 1996. https://web.archive.org/web/20201205183447/https://www.epic.org/crypto/key_escrow/joint_announce_10_2_96.html