1. Bruce Schneier, “Applied Cryptography Second Edition: Protocols, Algorithms and Source Code in C”, John Wiley and Sons, 1996.
2. Wassenaar arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies, Vienna, Austria. Information available at: http://www.wassenaar.org.
3. The OECD Cryptography Policy Guidelines and the Report on Background and Issues of Cryptography Policy, March 1997. Available at http://www.oecd.org
4. 61 Fed. Reg. 68572 (Dec. 30, 1996), available at BXA’s home page (http://www.bxa.doc.gov)
5. 63 Fed. Reg. 72165 (Dec. 31, 1998), available at BXA’s home page (http://www.bxa.doc.gov)