|
Cryptography and Cryptography Policy
- Encryption Working Group, Carnegie Endowment for International Peace, Moving the Encryption Policy Debate Forward, September 2019.
- Committee on Law Enforcement and Intelligence
Access to Plaintext Information in an Era of Widespread Strong
Encryption: Options and Trade Offs, Computer Sciemce and
Telecommunications Board, National Academies of Sciences, Engineering,
and
Medicine, Decrypting
the Encryption Debate: A Framework for Decisionmakers, 2018.
- S. Landau, Listening
In: Cybersecurity in an Insecure
Age, Yale University
Press, 2017. Some podcasts: an in-depth Hoover Book
Soiree
discussion with Ben Wittes and a short Science
blog interview
with Jen Golbeck.
- S. Landau, The
Real Security Risks of the iPhone
Case, Science, Vol. 352,
Issue 6292, June 17, 2016, pp. 1398-1399.
- S. Landau, Testimony, Hearing
on "The Encryption Tightrope: Balancing Americans' Security and
Privacy", Judiciary Committee, United States House of
Representatives, March 1. 2016.
- H. Abelson, R. Anderson, S. Bellovin,
J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau,
P. Neumann, R. Rivest, J. Schiller, B. Schneier, M. Specter, and
D. Weitzner,
Keys
under Doormats: Mandating insecurity by requiring government access to
all data and
communications, Journal
of Cybersecurity, Vol. 1, 2015.
- S. Landau, ``NSA and Dual EC_DRBG: Deja Vu All
Over Again?,'' Mathematical Intelligencer, Vol. 37, Issue 4 (December 2015), pp. 72-83.
- S. Landau, Testimony, Hearing
on Going Dark: Lawful Electronic Surveillance in the Face of New
Technologies, Subcommittee on Crime, Terrorism, and Homeland
Security, Judiciary Committee, United States House of Representatives, February 17,
2011.
- W. Diffie and S. Landau, The
Export of Cryptography in the 20th Century and the 21st, The
History of Information Security: A Comprehensive Handbook, Karl
De Leeuw and Jan Bergstra (eds.), Elsevier, 2007, pp. 725-736. Originally
appeared in Treichel, Jeanie and Mary Holzer (eds.), Sun Microsystems
Laboratories: the First Ten Years, 2001. Sun Labs Tech Report
2001-102. A modified version of this paper, September
11th Did Not Change Cryptography Policy, Notices of the American
Mathematical Society, April 2002, pp. 450-454.
- S. Landau, entries for "Clipper and Capstone"; "cryptography"; "digital
signatures," in
William Staples, ed. Encyclopedia of Privacy, Greenwood Press,
2007.
- S. Landau,
Find Me
a Hash, Notices of the American Mathematical Society,
March 2006, pp. 330-332; Mathematical Advance in
Translation, Chinese Academy of Sciences, 3 (2010),
pp. 226-228.
- S. Landau, RSA
and Public-Key Cryptography; Introduction to Cryptography; Cryptography:
Theory and Practice; Algebraic Aspects of Cryptography; Elliptic Curves:
Number Theory and Cryptography; Elliptic Curves in Cryptography; Modern
Cryptography, Probabilistic Proofs, and Pseudorandomness; Foundations of
Cryptography: Basic Tools; The Design of Rijndael: AES --- the Advanced
Encryption Standard; Handbook of Applied Cryptography, Bulletin of the American Mathematical Society, Vol. 41, No.
3 (2004), pp. 357-367.
- S. Landau, Polynomials in
the Nation's Service: Using Algebra to
Design the Advanced Encryption Standard, American
Mathematical Monthly, February 2004, pp. 89-117.
- W. Diffie and
S. Landau, September
11th Did Not Change Cryptography Policy, Notices of the American
Mathematical Society, April
2002, pp. 450-454.
- S. Landau, "Cryptography." Computer Sciences, Ed.,
Roger R. Flynn. Vol. 4: Electronic Universe. New York: Macmillan Reference
USA, pp. 49-53.
- S. Landau, Advanced
Encryption Standard Choice is
Rijndael, Notices of the American Mathematical Society, Jan.
2001, p. 38.
- S. Landau, Communications
Security for the Twenty-First Century: the Advanced Encryption Standard, Notices
of the American Mathematical Society, April 2000, pp. 450-459.
Reprinted, in translation, in
"Surveys in Applied and Industrial Mathematics," TVP Publishers
(Moscow), Vol. 7, No. 2 (2000), pp. 259-281.
- S. Landau, Standing
the Test of Time: the Data Encryption Standard, Notices of the
American Mathematical Society, March
2000, pp. 341-349. Reprinted, in translation, in "Surveys in Applied
and Industrial Mathematics," TVP Publishers (Moscow), Vol. 7, No. 2
(2000), pp. 240-258.
- S. Landau, Designing Cryptography for the New
Century, Communications of the Association for Computing
Machinery, Vol. 43, No. 5, May 2000, pp. 115-120.
- S. Landau, Cryptography
in Crisis, Commentary (In My
Opinion), Notices of the American Mathematical Society, April
1998, p. 461.
- Whitfield Diffie and Susan Landau,
Privacy on the Line:
The Politics of Wiretapping and Encryption, MIT Press, rev. and updated edition, 2007 (orig. pub. 1998).
- S. Landau, S. Kent, C. Brooks,
S. Charney, D. Denning, W. Diffie, A. Lauck, D. Miller,
P. Neumann and
D. Sobel, Codes,
Keys, and Conflicts: Issues in U.S. Crypto Policy, ACM
Press, 1994. This report, funded by the NSF, was an
undertaking of the USACM Committee on Public Policy.
Dr. Stephen Kent, Chief Scientist - Security Technology,
Bolt, Beranek and Newman, chaired the panel, which consisted
of senior members of the cryptography and security
communities, including members of the government, industry,
and academia. A summary of the report appeared under the
title
Crypto
Policy Perspectives, in Communications of the
ACM, Vol. 37 (Aug. 1994), pp. 115-121.
- S. Landau, Some Remarks on
Computing the Square Parts of Integers, Information and Computation, Vol.
78, No. 3 (1988), pp. 246-253.
- S. Landau, Zero Knowledge and the Department
of Defense, Notices
of the American Mathematical Society [Special Article Series],
Vol. 35, No. 1 (1988), pp. 5-12.
- S. Landau, Primes, Codes and the National
Security Agency, Notices
of the American Mathematical Society, [Special Article Series],
Vol. 30, No. 1 (1983), pp. 7-10.
Privacy
- S. Landau, Categorizing
Uses of Communications Metadata: Systematizing Knowledge and Presenting
a Path for Privacy," New
Security Paradigms Workshop, 2020.
- S. Landau and A. Lubin, Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended?, Harvard National Security Journal, Vol. 11, Issue 3 (2020), pp. 308-358.
- S. Landau, If It Isn't Efficacious, Don't Do It, European Data Protection Law Review, Vol. 5, Issue 4 (2019), pp. 466-470.
- S. Landau, Comments
submitted to the NTIA request for comments on privacy, October 24,
2018.
- S. Landau, Is
it Legal? Is it Right? The Can and Should of Use,
IEEE Security and Privacy, Vol. 14, No. 5 (September/October
2016), pp. 3-5.
- S. Landau,
Transactional
information is remarkably
revelatory, Proceedings of the
National Academy of Sciences, Vol. 113, No. 20 (May 17, 2016), pp. 5467-5469.
- S. Landau, Choices: Privacy & Surveillance in a Once & Future Internet, Daedulus, Vol. 145, No. 1 (Winter 2016), pp. 54-64.
- S. Landau, Control Use of Data
to Protect
Privacy, Science,
Vol. 347, Issue 6221, January 30, 2015.
- S. Landau, Educating
Engineers: Teaching Privacy in a World of Open Doors (pre-publication version),
IEEE
Security and Privacy, Vol. 12, No. 3, May/June 2014,
pp. 66-70.
- S. Landau, Politics, Love, and
Death in a World of No
Privacy, IEEE
Security and Privacy, Vol. 11, No. 3, May/June 2013,
pp. 11-13.
- A. Cavoukian, A. Davidson, M. Hansen, S. Landau, and
A. Slomovic, Privacy: Front and
Center, IEEE
Security and Privacy, Vol. 10, No. 5, September/October 2012,
pp. 5-10.
- S. Landau and
T. Moore, Economic
Tussles in Federated Identity
Management, First Monday,
Vol. 17, No. 10 (October 2012). An earlier version appeared
at Workshop on Economics
of Information Security, 2011.
- W. Diffie and
S. Landau, Communications
Surveillance: Privacy and Security at Risk, Communications of the ACM,
Vol. 52, Issue 11, November 2009, pp. 42-47,
and Queue, September 2009.
- S. Landau, H. Le Van Gong, and R.
Wilton, Achieving Privacy in a
Federated Identity Management System,
Financial Cryptography and Data Security
'09.
- S. Landau,
The NRC Takes on Data
Mining, Behavioral Surveillance, and
Privacy, IEEE
Security and Privacy, Vol. 7, No. 1, January/February
2009, pp. 58-62.
- S. Landau, Privacy and
Security: A Multidimensional Problem, Viewpoints Column, Communications
of the ACM, Vol. 51, Issue 11, November 2008, pp. 25-26.
- W. Diffie and
S. Landau, Privacy
on the Line: The Politics of Wiretapping and Encryption, MIT
Press, 1998 (rev. ed. 2007).
Cybersecurity
- Committee on Law Enforcement and Intelligence
Access to Plaintext Information in an Era of Widespread Strong
Encryption: Options and Trade Offs, Computer Sciemce and
Telecommunications Board, National Academies of Sciences, Engineering,
and
Medicine, Decrypting
the Encryption Debate: A Framework for Decisionmakers, 2018.
- S. Landau, Listening
In: Cybersecurity in an Insecure
Age, Yale University
Press, 2017. Some podcasts: an in-depth Hoover Book
Soiree
discussion with Ben Wittes and a short Science
blog interview
with Jen Golbeck.
- S. Landau, Russia's
Hybrid Warriors Got the White House, Now They're Coming for America's
Town Halls, Foreign Policy,
September 26, 2017.
- S. Bellovin, S. Landau, and H. Lin,
Limiting
the Undesired Impact of Cyber Weapons: Technical Requirements and
Policy
Implications, Journal
of Cybersecurity, Vol. 3, Issue 1 (2017), pp. 59-68. Reprinted in
Herbert Lin and Amy Zegart,
eds., Bytes,
Bombs, and Spies: The Strategic Dimensions of Offensive Cyber
Operations, Brookings Institution Press, 2018.
- S. Bellovin, M. Blaze, S. Landau, and S. Pell,
It's
Too Complicated: How the Internet Upends Katz, Smith, and
Electronic Surveillance
Law, Harvard Journal of Law
and Technology, Vol. 30, No. 1 (2017).
- R. Wyden, M. Blaze, and
S. Landau, The
Government Will Soon Be Able to Legally Hack
Anyone, Wired, September 14,
2016.
- S. Landau, The
Real Security Risks of the iPhone
Case, Science, Vol. 352,
Issue 6292, June 17, 2016, pp. 1398-1399.
- S. Bellovin, M. Blaze, and
S. Landau, Insecure
Surveillance: Technical Issues with Remote Computer
Searches, Computer,
Vol. 49, No. 3 (March 2016), pp. 14-24; reprinted in Computing Now, June 2016.
- S. Landau, Testimony, Hearing
on "The Encryption Tightrope: Balancing Americans' Security and
Privacy", Judiciary Committee, United States House of
Representatives, March 1, 2016.
- S. Landau, Perspective:
Cybersurveillance and the New Frontier of
Deterrence, Current
History, Vol. 115, Issue 117 (January 2016), pp. 29-31.
- H. Abelson, R. Anderson, S. Bellovin,
J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau,
P. Neumann, R. Rivest, J. Schiller, B. Schneier, M. Specter, and
D. Weitzner,
Keys
under Doormats: Mandating insecurity by requiring government access to
all data and
communications, Journal
of Cybersecurity, Vol. 1, 2015; a short version of "Keys under
Doormats," appeared in
Communications
of the ACM, Vol. 58, No. 10, pp. 24-26.
- Committee on Responding to Section 5(d) of
Presidential Policy Directive 28: The Feasibility of Software to
Provide Alternatives to Bulk Signals Intelligence Collections,
National Research
Council, Bulk
Collection of Signals Intelligence: Technical Options, National
Academies Press, 2015.
- S. Bellovin, M. Blaze, and
S. Landau, Comments on Proposed
Search
Rules, Preliminary
Draft of Proposed Amendments to the Federal Rules of Appellate,
Bankruptcy, Civil, and Criminal Procedure, October 31, 2014.
-
S. Landau, Under
the Radar: NSA's Efforts to Secure Private-Sector Telecommunications
Infrastructure, Journal of National
Security Law and Policy, Vol. 7, No.3 (2014), pp. 411-442; one section,
, was reprinted
in Intelligence, translation by Junichi Hiramatsu, Vol. 15, March, 2015.
- S. Landau,
Making
Sense of Snowden Part II: What's Significant in the NSA Surveillance
Revelations
, IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014; a short
version, Highlights
from Making Sense of Snowden Part II: What's Significant in the NSA
Surveillance Revelations, (behind payment wall) appeared
in IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014, pp. 62-64.
- S. Bellovin, M. Blaze, S. Clark,
S. Landau, Lawful
Hacking: Using Existing Vulnerabilities for Wiretapping on the
Internet, Northwestern Journal of Technology and Intellectual Property, Vol. 12, Issue 1 (2014).
- S. Landau,
Making Sense of Snowden: What's
Significant in the NSA Surveillance Revelations
, IEEE
Security and Privacy, Vol. 11, No. 4, July/August 2013,
pp. 54-63.
- B. Adida, C. Anderson, A. Anton,
R. Dingledine, E. Felten, M. Green, J. A. Halderman, D. Jefferson,
C. Jennings, N. Mitter, P. Neumann, E. Rescorla, F. Schneider,
B. Schneier, H. Shacham, M. Sherr, D. Wagner, and
P. Zimmermann, CALEA
II: Risks of Wiretap Modifications to Endpoints" (whitepaper), May
2013.
- S. Bellovin, M. Blaze, S. Clark, and
S. Landau,
Going Bright: Wiretapping without
Weakening Communications
Infrastructure, IEEE
Security and Privacy, Vol. 11, No. 1, January/February 2013,
pp. 62-72. [Cited in New York
Times editorial,
May 20, 2013.]
- M. Blaze and
S. Landau, The
FBI Needs Hackers, Not
Backdoors, Wired, January
14, 2013.
-
S. Landau, The
Large Immortal Machine and The Ticking Time
Bomb, Journal of Telecommunications
and High Technology Law, Volume 11, Issue 1 (2013), pp. 1-43.
- C. Landwehr, D. Boneh, J. Mitchell, S. Bellovin,
S. Landau, and
M. Lesk, Privacy
and Cybersecurity: The Next 100
Years,
Proceedings of the IEEE, Vol. 100, Issue: Special Centennial Issue (2012), 1659-1673.
- S. Bellovin, S. Bradner, W. Diffie, S. Landau, and
J. Rexford, Can
It Really Work? --- Problems with Extending EINSTEIN to Critical
Infrastructure, Harvard National Security
Journal, Vol. 3 Issue 1 (2012). A short version of this paper appeared
as As simple as possible---but not more so, S. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford, Communications of the ACM, Vol. 54, No. 8 (2011).
- S. Landau, Testimony, Hearing
on Going Dark: Lawful Electronic Surveillance in the Face of New
Technologies, Subcommittee on Crime, Terrorism, and Homeland
Security, Judiciary Committee, United States House of Representatives,
February 17, 2011.
- S. Landau, Surveillance
or Security? The Risks Posed by New Wiretapping Technologies, MIT Press, 2011.
- D. D. Clark and
S. Landau, Untangling
Attribution, Harvard National
Security Journal, Vol. 2, Issue 2 (2011); an earlier version
appeared
in Proceedings of
a Workshop on Deterring Cyberattacks: Informing Strategies and
Developing Options for U.S. Policy, National Academies Press,
2010, pp. 25-40.
- D. D. Clark and
S. Landau, The Problem Isn't Attribution: It's Multi-Stage Attacks, Third
International Workshop on Re-Architecting the Internet, 2010.
- S. Landau,
Testimony Cybersecurity
Activities at NIST's Information Technology Laboratory, Hearing
before the Subcommittee on Technology and Innovation, Committee on
Science and Technology, United States House of Representatives,
October 22, 2009.
- W. Diffie and
S. Landau, Communications
Surveillance: Privacy and Security at Risk, Communications of the ACM,
Vol. 52, Issue 11, November 2009, pp. 42-47,
and Queue, September 2009.
- S. Landau, Privacy and
Security: A Multidimensional Problem, Viewpoints Column, Communications
of the ACM, Vol. 51, Issue 11, November 2008, pp. 25-26.
- W. Diffie and S. Landau, Brave
New World of Wiretapping, Scientific
American, September 2008, pp. 33-39.
- S. Landau, Security
and Privacy Landscape in Emerging Technologies,
IEEE
Security and Privacy, Vol. 6, No. 4, August/September 2008,
pp. 74-77.
- S. Bellovin, M. Blaze, W. Diffie, S. Landau, P. Neumann,
and J. Rexford, Risking Communications Security:
Potential Hazards of the `Protect America Act,'
IEEE
Security and Privacy, Vol. 6, No. 1, January/February 2008,
pp. 24-33. A short version appeared as Internal
Risks, External Surveillance Inside Risks 209, CACM 50,
p. 128, Dec, 2007.
- S. Landau, A
Gateway for Hackers: The Security Threat in the New Wiretapping Law, Washington
Post, August 9, 2007, p. A17.
- S. Bellovin, M. Blaze, E. Brickell, C. Brooks, V. Cerf,
W. Diffie, S. Landau, J. Peterson, J. Treichler, Security Implications
of Applying the Communications Assistance for Law Enforcement Act to
Voice over IP, 2006.
- S. Landau, National Security
on the Line, Journal of Telecommunications and
High Technology Law, Vol. 4, Issue 2 (2006), pp. 409-447.
- S. Landau, Security, Wiretapping,
and the Internet, IEEE
Security and Privacy, Vol. 3, No. 6, pp. 26-33, November/December
2005.
- S. Bellovin, M. Blaze, and S. Landau, The
Real National-Security Needs for VoIP, Inside Risks
180, CACM 48, Nov. 2005, p. 120.
- S. Landau and M. Stytz, "Overview of Cyber Security:
A Crisis of Prioritization," IEEE Security and Privacy,
Vol. 3, No. 3, pp. 9-11 and sidebar, S. Landau, C. Landwehr, and F.
Schneider, "The PITAC Report: A Brief Analysis,"
p. 10.
- S. Landau, What
Lessons Are We Teaching, Inside Risks 180, CACM 48,
June, 2005, p. 144.
- S. Landau, Security,
Liberty, and Electronic Communications, (invited talk),
in Matt Franklin (ed.), Advances in Cryptology: CRYPTO 2004,
Springer Verlag, pp. 355-372.
- S. Landau, "The Transformation of Global Surveillance," in Bytes,
Bombs, and Bandwidth: Information Technology and Global Security, Social
Science Research Council, 2003, pp. 117-131.
- W. Diffie and S. Landau, "Cybersecurity Should
be Kept in Civilian Hands," Boston Globe, August 19, 2002,
pp. E-4. Appeared in slightly different form as "Ensuring Cybersecurity" in NGO
Reporter, Vol. 10, No. 2, Sept. 2002.
- W. Diffie and S. Landau, "The Threat of .NET," New
Technology Week, Nov. 5, 2001.
- S. Landau, Cryptography
in Crisis, Commentary (In My Opinion), Notices of the American
Mathematical Society, April 1998, p. 461.
- S. Landau, "Dangerous Increase of FBI Surveillance,"
Op-Ed, Chicago Tribune, March 6, 1998, p. 23.
- W. Diffie and
S. Landau, Privacy
on the Line: The Politics of Wiretapping and
Encryption, MIT Press, 1998; updated and
expanded edition, 2007.
- S. Landau and W. Diffie, Cryptography Control:
FBI Wants It, but Why? Op-Ed, Christian Science Monitor, Oct.
6, 1997, p. 19.
- S. Landau, Eavesdropping and Encryption: U.S. Policy
in an International Perspective, Conference on the Impact of the
Internet on Communications Policy (1997), John F. Kennedy School
of Government, Harvard University.
- S. Landau, S. Kent, C. Brooks,
S. Charney, D. Denning, W. Diffie, A. Lauck, D. Miller,
P. Neumann and
D. Sobel, Codes,
Keys and Conflicts: Issues in U.S. Crypto Policy, ACM
Press, 1994. This report, funded by the NSF, was an
undertaking of the USACM Committee on Public
Policy. Dr. Stephen Kent, Chief Scientist - Security
Technology, Bolt, Beranek and Newman, chaired the panel,
which consisted of senior members of the cryptography and
security communities, including members of the government,
industry, and academia. A summary of the report appeared
under the
title Crypto
Policy Perspectives, in Communications of the
ACM, Vol. 37 (Aug. 1994), pp. 115-121.
- S. Landau, Zero
Knowledge and the Department of Defense, Notices of
the American Mathematical Society [Special Article
Series], Vol. 35, No. 1 (1988), pp. 5-12.
- S. Landau, Primes, Codes and the National Security Agency, Notices
of the American Mathematical Society, [Special Article Series],
Vol. 30, No. 1 (1983), pp. 7-10.
Law and Public Policy
- Steven M. Bellovin, Matt Blaze, Susan Landau, and
Brian
Owsley, Seeking
the Source: Criminal Defendants' Constitutional Right to Source
Code, Ohio State Technology Law Journal, Volume 17, No. 1, Winter
2021.
- S. Bellovin, M. Blaze, S. Landau, and S. Pell,
It's
Too Complicated: How the Internet Upends Katz, Smith, and
Electronic Surveillance
Law, Harvard Journal of Law
and Technology, Vol. 30, No. 1 (2017).
- S. Bellovin, M. Blaze, and
S. Landau, Insecure
Surveillance: Technical Issues with Remote Computer
Searches, Computer,
Vol. 49, No. 3 (March 2016), pp. 14-24; reprinted in Computing Now, June 2016.
- S. Bellovin, M. Blaze, and
S. Landau, Comments on Proposed
Search
Rules, Preliminary
Draft of Proposed Amendments to the Federal Rules of Appellate,
Bankruptcy, Civil, and Criminal Procedure, October 31, 2014.
- S. Bellovin, M. Blaze, S. Clark,
S. Landau, Lawful
Hacking: Using Existing Vulnerabilities for Wiretapping on the
Internet, Northwestern Journal of Technology and Intellectual Property, Vol. 12, Issue 1 (2014).
- C. Landwehr, D. Boneh, J. Mitchell, S. Bellovin,
S. Landau, and
M. Lesk, Privacy
and Cybersecurity: The Next 100
Years,
Proceedings of the IEEE, Vol. 100, Issue: Special Centennial Issue (2012), 1659-1673.
- S. Bellovin, S. Bradner, W. Diffie, S. Landau, and
J. Rexford, Can
It Really Work? --- Problems with Extending EINSTEIN to Critical
Infrastructure, Harvard National Security
Journal, Vol. 3 Issue 1 (2012). A short version of this paper appeared
as As simple as possible---but not more so, S. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford, Communications of the ACM, Vol. 54, No. 8 (2011).
- S. Landau, Testimony, Hearing
on Going Dark: Lawful Electronic Surveillance in the Face of New
Technologies, Subcommittee on Crime, Terrorism, and Homeland
Security, Judiciary Committee, United States House of Representatives,
February 17, 2011.
- S. Landau, Surveillance
or Security? The Risks Posed by New Wiretapping Technologies, MIT Press, 2011.
- S. Bellovin, M. Blaze, W. Diffie, S. Landau, P. Neumann,
and J. Rexford, Risking Communications Security:
Potential Hazards of the `Protect America Act,'
IEEE
Security and Privacy, Vol. 6, No. 1, January/February 2008,
pp. 24-33. A short version appeared as Internal
Risks, External Surveillance Inside Risks 209, CACM 50,
p. 128, Dec, 2007.
- S. Landau, A
Gateway for Hackers: The Security Threat in the New Wiretapping Law, Washington
Post, August 9, 2007, p. A17.
- S. Bellovin, M. Blaze, E. Brickell, C. Brooks, V. Cerf,
W. Diffie, S. Landau, J. Peterson, J. Treichler, Security Implications
of Applying the Communications Assistance for Law Enforcement Act to
Voice over IP, 2006.
- S. Landau, National Security
on the Line, Journal of Telecommunications and
High Technology Law, Vol. 4, Issue 2 (2006), pp. 409-447.
- S. Landau, Security, Wiretapping,
and the Internet, IEEE
Security and Privacy, Vol. 3, No. 6, pp. 26-33, November/December
2005.
Identity Management
- S. Landau and
T. Moore, Economic
Tussles in Federated Identity
Management, First Monday,
Vol. 17, No. 10 (October 2012). Earlier version appeared
at Workshop on Economics
of Information Security, 2011.
- S. Landau, H. Le Van Gong, and R.
Wilton, Achieving Privacy in a
Federated Identity Management System,
Financial Cryptography and Data Security
'09.
- S. Landau and D. Mulligan, I'm
Pc01002/SpringPeeper/ED288l.6; Who are You?,
IEEE Security
and Privacy, Vol. 6, No. 2, March/April 2008, pp. 13-15.
- S. Landau,
Liberty ID-WSF Security and Privacy Overview, October 2003.
- S.
Landau and J. Hodges, A
Brief Introduction to Liberty, February 13, 2003.
- G. Ellison,
J. Hodges, and S. Landau, Risks Presented by Single
Sign-On Architectures, October 18, 2002.
- G. Ellison, J. Hodges,
and S. Landau, Security and Privacy Concerns
of Internet Single Sign-On, September 6, 2002.
Digital Rights Management
Symbolic Computation
- S. Landau, "Computations with
Algebraic Numbers," in J. Grabmeier, E. Kaltofen, and
V. Weispfennig (eds.), Computer Algebra Handbook,
Spring Verlag, 2003, pp. 18-19.
- S. Landau and N.
Immerman, Embedding
Linkages in Integer Lattices, Algorithmica,
Vol. 43, No. 5, May 2000, pp. 115-120. A preliminary version
appeared in MSI Workshop on Computational Geometry,
October, 1994.
-
S. Landau, Compute
and Conjecture, Commentary (In My Opinion), Notices of the
American Mathematical Society, Feb. 1999, p. 189.
- S. Landau,
: Four Different Views, Mathematical
Intelligencer, Vol. 20, No. 4 (Fall 1998), pp. 55-60.
- D. Kozen, S. Landau, and R. Zippel,
Decomposition of Algebraic Functions, Journal of Symbolic
Computation, Vol. 22 (1996), pp. 235-246. A preliminary version
appeared in Algorithmic Number Theory Symposium (1994).
-
S. Landau, How
to Tangle with a Nested Radical, Mathematical
Intelligencer, Vol. 16, No. 2 (Spring 1994), pp. 49-55.
- S. Landau, Finding Maximal
Subfields, SIGSAM Bulletin, Vol. 27, No. 3 (1993), pp. 4-8.
- S. Landau, Simplification of Nested
Radicals, SIAM J. of Comput., Vol. 21 (1992), pp. 85-110. A
preliminary version appeared in Thirtieth Annual IEEE Symposium
on Foundations of Computer Science (1989), pp. 314-319.
- S. Landau, A Note on `Zippel
Denesting,' J. Symb. Comput., Vol. 13 (1992), pp. 41-47.
- J. Cremona and S. Landau, Shrinking
Lattice Polyhedra, SIAM J. of Discrete Math, Vol. 3, No. 3
(1990), pp. 338-348. A preliminary version appeared
in Proceedings of the First ACM-SIAM Symposium on Discrete
Algorithms (1990), pp. 188-193.
- D. Kozen and S. Landau, Polynomial
Decomposition Algorithms, J. Symb. Comput., Vol. 7 (1989),
pp. 445-456. Appeared in a different version as J. von zur Gathen,
D. Kozen and S. Landau, "Functional Decomposition of
Polynomials" Twenty-Eight Annual IEEE Symposium on the
Foundations of Computer Science (1989), pp. 314-319.
- S. Landau, Factoring Polynomials
Quickly, Notices of the American Mathematical Society,
[Special Article Series], vol. 34, No. 1 (1987), pp. 3-8.
- S. Landau and
G. Miller, Solvability
by Radicals is in Polynomial Time, J. Comput. Sys. Sci.,
Vol. 30, No. 2 (1985), pp. 179-208. A preliminary version appeared
in Fifteenth ACM Symposium on Theory of Computing (1983),
pp. 140-151.
- S. Landau, Factoring Polynomials over
Algebraic Number Fields, SIAM J. of Comput., Vol. 14, No. 1
(1985), pp. 184-195.
- S. Landau, Polynomial Time Algorithms
for Galois Groups, Proceedings of the Int'l. Symposium on
Symbolic and Algebraic Computation (1984), Spring Verlag Lecture
Notes in Computer Science, No. 174, pp. 225-236.
Complexity
- N. Immerman and S. Landau, The Complexity of Iterated
Multiplication, Information and Computation Vol. 116, No.
1 (1995), pp. 103-116. A preliminary version appeared in Fourth
Annual Structure in Complexity Conference (1989), pp. 104-111.
- S. Landau and N. Immerman, The Similarities (and Differences) between
Polynomials and Integers, Int'l. Conf. on Number Theoretic and
Algebraic Methods in Computer Science (1993), pp. 57-59.
Women in Science
- T. Benzel, S. Landau, and H. Orman, Expanding the
Pipeline: G/rep{sec}= underrepresented groups in security
research, Computing Research News, March 2015, pp. 8-10.
- S. Landau, Anywhere,
Anytime -- Or Just Where is Your Office Anyhow? Pipeline series, Computing
Research News, September
2005, p. 2.
- S. Landau, A
Far Cry from Galois Fields, Newsletter of the
Association for Women in Mathematics, November-December
2003, pp. 10-13.
- S. Landau,
Time to Move Mountains, Commentary (In My
Opinion), Notices of the American Mathematical Society,
Sept. 2000, p. 853.
- S. Landau, What Happens to the Women? Association for
Women in Mathematics Newsletter, March-April 1995, pp. 6-7.
- S. Landau, Universities and the Two-Body Problem, Computing
Research News, March, 1994, p. 4. Also reprinted in the Association
for Women in Mathematics Newsletter, March 1994,
pp. 12-14, and SIGACT News, Dec. 1994, pp. 41-43 and reprinted in Complexities:
Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton
University Press, 2005, pp. 253-256.
- S. Landau, Tenure Track, Mommy Track, Association
for Women in Mathematics Newsletter, May-June 1991. Also reprinted in
shortened
form in Notices of the American Mathematical Society,
Sept. 1991, pp. 703-4 and reprinted in Complexities:
Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton
University Press, 2005, pp. 260-263.
Miscellaneous
- S. Landau, Contact-Tracing
Apps: What's Needed to Be an Effective Public Health
Tool, Lawfareblog,
January 19, 2021.
- S. Landau, Law
Enforcement is Accessing Locked Devices Quite Well, Thank
You, Lawfareblog,
December 7, 2020.
- S. Landau, It's Never Too Late to Think about NSA's CDR Collection Program, Lawfareblog, June 22, 2020.
-
S. Landau, C. Lopez, and L. Moy, The
Importance of Equity in Contact
Tracing, Lawfareblog,
May 1, 2020.
- S. Landau, Looking
Beyond Contact Tracing to Stop the
Spread, Lawfareblog,
April 10, 2020.
- S. Landau, Location
Surveillance to Counter COVID-19: Efficacy is What
Matters, Lawfareblog,
March 25, 2020.
- S. Landau, If We Build It (They
Will Break In), Lawfareblog,
February 28, 2020.
- D. McDonough and S. Landau, Breaking the Encryption Impasse, The Hill, January 16, 2019.
- S. Landau, A
Thoughtful Response to Going Dark and the Child Pornography
Issue, Lawfareblog,
November 5, 2019.
- S. Landau, A
Security Failure in the White
House, Lawfareblog,
November 1, 2019.
- S. Landau, The
NSA General Counsel's Proposal for a
Moonshot, Lawfareblog,
September 23, 2019.
- J. Baker and
S. Landau, New
Perspectives on the Future of
Encryption, Lawfareblog,
May 28, 2019.
- S. Landau,
Is
Section 215 No Longer Worth the
Effort?, Lawfareblog,
March 11, 2019.
-
S. Landau, Cryptography
Policy
Laundering, Center for
International Law and
Governance, The Fletcher School, January 15, 2019.
- S. Landau, Exceptional Access: The Devil is in the Details, Lawfareblog, December 26, 2018.
- S. Bellovin and
S. Landau, Encryption
by Default Equals National
Security, Lawfareblog,
October 26, 2018.
- S. Landau, The
Five Eyes Statement on Encryption: Things are Seldom What They
Seem, Lawfareblog,
September 26, 2018.
- S. Landau, Why
the Russians Might Hack the Boy
Scouts, The
Conversation, September 13, 2018.
- S. Landau, Brett Kavanaugh's Failure to Acknowledge the Changes in Communications Technology, Lawfareblog, August 3, 2018.
- S. Landau, What's Involved in Vetting a Security Proposal: Why Ray Ozzie's Proposal for Exceptional Access Does Not Pass Muster, Lawfareblog, May 14, 2018.
- S. Bellovin, M. Blaze, D. Boneh, S. Landau,
R. Rivest, Analysis
of the CLEAR Proposal per the National Academies' Framework,
Columbia Univeristy Tech Report, CU-003-18, May 10, 2018.
- S. Bellovin, M. Blaze, D. Boneh, S. Landau,
R. Rivest, Ray
Ozzie's crypto proposal: a dose of technical reality
(op-ed), Ars Technica, May 6,
2018.
- S. Landau, Building on Sand isn't Stable: Correcting a Misunderstanding of the National Academies Report on Encryption, Lawfareblog, April 25, 2018.
- S. Landau, The Russians Are Coming, Lawfareblog, April 18, 2018.
- S. Landau, Revelations on the FBI's Unlocking of the San Bernardino Phone: Maybe the Future Isn't Going Dark After All, Lawfareblog, March 30, 2018.
- S. Landau, What Went Wrong? Facebook and "Sharing Data" with Cambridge Analytica, Blog@ACM, March 28, 2018.
- S. Landau, No Facebook, It's Not About Security; It's About Privacy, Lawfareblog, March 26, 2018.
- S. Landau, Encrypted Smartphones Secure Your Identity, Not Just Your Data, The
Conversation, February 28, 2018; reprinted in The Conversation---Indonesia, March 15, 2018.
- S. Landau,
Understanding Data Breaches as National Security Threats, Lawfareblog, February
26, 2018.
- S. Landau, What Law Enforcement Really Needs for Investigations in the Digital Age, Lawfareblog, February 12, 2018.
- S. Landau, Cybersecurity:
Time for a New
Definition, Lawfareblog,
January 12, 2018.
- S. Landau, Using
Threat Modeling to Secure
America, Lawfareblog,
December 20, 2017.
- S. Landau, Real
Security Requires Encryption---Even if Investigators Get
Blocked, The
Conversation, November 1, 2017.
- S. Landau, Punching
the Wrong Bag: The Deputy AG Enters the Crypto
Wars, Lawfareblog,
October 27, 2016.
- S. Landau, Phones
Move---and So Should the
Law, Lawfareblog, August
16, 2017.
-
S. Landau, An
Important Russian Hacking
Story, Lawfareblog, June
2, 2017.
- S. Landau, A
Step Forward for
Security, Lawfareblog,
May 17, 2017.
- S. Landau, The
FBI and I
Agree, Lawfareblog,
March 14, 2017.
- S. Landau and
C. O'Neil, Why
Ghosts in the Machine Should Remain Ghosts,
Lawfareblog, December 7, 2016.
- S. Landau, The
FBI Should be Enhancing US Cybersecurity, Not Undermining
It, Lawfareblog,
December 1, 2016.
- S. Landau,
Protecting
the Republic: Securing Communications is More Important than
Ever, Lawfareblog,
November 21, 2016.
-
S. Landau, Securing
Phones and Securing Us (revisited), Lawfareblog, September 15, 2016.
-
S. Landau, Setting
Up a Straw Man: ODNI's Letter in Response to Don't
Panic, Lawfareblog, May
12, 2016.
-
S. Landau, Million
Dollar Vulnerabilities and an FBI for the Twenty-first Century, Lawfareblog,
April 26, 2016.
- S. Landau, A
Response to Susan's
Post, Lawfareblog, March 25,
2016.
- S. Landau, The
National-Security Needs for Ubiquitous
Encryption, Lawfareblog,
February 2, 2016 (also appeared
in Don't
Panic: Making Progress on the Going Dark Debate, Berkman Center for Internet & Society
Berklett Cybersecurity Project (also translated into
Portuguese
by Instituto de Tecnologia e
Sociedade do Rio), 2019.
- S. Landau, Be Careful What You Wish For: A Response, Lawfareblog, January 8, 2016.
- S. Landau, The
Encryption Wars: Everything has Changed, and Nothing has
Changed, Scientific
American (blog post), November 18, 2015.
- S. Landau, Why the Support for Crypto, Lawfareblog, September 21, 2015.
- S. Landau, A Public Split: Listening to the Conversation at Aspen, Lawfareblog,
July 28, 2015.
- S. Landau, Thoughts on Encryption and Going Dark: Counterpart, Lawfareblog, July 15, 2015.
- S. Landau, Keys
under Doormats: Mandating
Insecurity, Lawfareblog,
July 7, 2015.
-
S. Landau, Director
Comey and the Real
Threats, Lawfareblog,
July 3, 2015.
-
S. Landau, Why
the Privacy Community Focuses Where it
Does, Lawfareblog, June 16,
2015.
- S. Landau, What was Samsung Thinking?, Letter from the Editor, IEEE
Security and Privacy, Vol. 13, No. 3, May/June 2015,
pp. 3-4.
-
S. Landau, Time
to Resolve the Metadata Fight,
Lawfareblog, May
29, 2015.
-
S. Landau, What
We Must Do about
Cyber, Lawfareblog,
March 10, 2015.
-
S. Landau, Finally
... Some Clear Talk on the Encryption
Issue, Lawfareblog,
February 16, 2015.
-
S. Landau, What
David Cameron Doesn't
Get, Lawfareblog,
January 20, 2015.
-
S. Landau, Summing
Up, Communications of the
ACM, Vol. 57, No. 11, November 2014, pp. 37-39.
-
S. Landau, Securing
Phones --- and Securing
US, Lawfareblog,
September 29, 2014.
- S. Landau, Facing
Ethical
Choices, Letter from the Editor, IEEE
Security and Privacy, Vol. 12, No. 4, July/August 2014,
pp. 3-6.
-
S. Landau, On
NSA's Subversion of NIST's
Algorithm, Lawfareblog,
July 25, 2014.
-
S. Landau, What
The Court Didn't Say in Riley May be the Most Important
Thing of
All, Lawfareblog,
June 30, 2014.
-
S. Landau, What
the President Said --- and Didn't Say --- About
Surveillance, Huffington
Post, August 11, 2013.
-
S. Landau, Susan
Landau on
Minimization, Lawfareblog.com,
June 18, 2013.
-
S. Landau, Canaries
in the Coal
Mine, Huffington
Post, June, 6, 2013.
-
S. Landau, Susan
Landau on USG Surveillance via New Technologies, Lawfareblog.com, April 30, 2013.
-
S. Landau,
Boston and the Right to
Privacy, Huffington
Post, April 22, 2013.
- S. Landau, Cybersecurity
--- Getting it Right This
Time, Huffington
Post, February 13, 2013.
- S. Landau, Searching
in a Haystack ... Finds
Straw, Huffington
Post, October 15, 2012.
-
S. Landau, Susan
Landau on Cybersecurity Bills, Lawfareblog.com, May 3, 2012.
-
S. Landau,
Nothing to Fear but Fear Itself,
Huffington Post, April 29, 2012.
- S. Landau,
Timesharing Dexter,
R.L. Constable and A. Silva (eds.), Logic and Program
Semantics - Essays Dedicated to Dexter Kozen on the Occasion of
His 60th Birthday, LNCS 7230, pp. 329-332, Springer, 2012.
- S. Landau, One
Small Step for
Privacy..., Huffington
Post, January 26, 2012.
- S. Landau, It's
All in How You View
It, Huffington Post,
January 17, 2012.
- S. Landau, Surveillance
and security: Securing whom? And at what
cost?, Privacy
International, November 30, 2011.
- S. Landau, Hollywood and the Internet: Time for the Sequel, Huffington Post, November 28, 2011.
- S. Landau, Who Knows Where I Am? What Do They Do with the Information?, Huffington Post, October 3, 2011.
- S. Landau, Data Retention? News of the World Demos the Risks, Huffington Post, July 21, 2011.
- S. Landau, Mr. Murdoch and Mr. Brown: A Real-Life Example of Why Privacy Matters, Huffington Post July 18, 2011.
-
S. Landau, Where
Have All the Wiretap Reports
Gone?, Huffington
Post, July 14, 2011.
- S. Landau, Privacy, Online Identity Solutions, and Making Money: Pick Three?, Huffington Post, July 7, 2011.
- S. Landau, Getting
Communications Security
Right, Huffington
Post, April 19, 2011.
- S. Landau, Getting
Wiretapping
Right, Huffington
Post, April 5, 2011.
- S. Landau, NIST
Leads the Charge on Online
Authentication, Huffington Post,
January 12, 2011.
- S. Landau, Who's Been Looking Over My Shoulder? --- The FTC Seeks to Update Privacy Protections, Huffington Post, December 6, 2010.
- S. Landau, The FBI Wiretap Plan: Upsetting the Security Equation, Huffington Post, October 25, 2010.
- S. Landau, Moving
Rapidly Backwards on
Security, Huffington
Post, October 13, 2010.
- S. Landau, The
Pentagon's Message on
Cybersecurity, Huffington Post, , August
31, 2010.
- S. Landau, Wrong
Direction on
Privacy, Huffington
Post, August 2, 2010.
- S. Landau, Separating
Wheat from
Chaff, Huffington
Post, July 23, 2010.
- S. Landau,
Internet Time, Commentary (In My
Opinion), Notices of the American Mathematical Society, March
2000, p. 325.
- S. Landau, The
Myth of the Young Mathematician, Letter from the
Editor, Notices of the American Mathematical Society, Nov. 1997,
p. 1284.
- S. Landau, Mathematicians
and Social Responsibility, Letter from
the Editor, Notices of the American Mathematical Society,
Feb. 1997, p. 188.
- S. Landau, Rising
to the Challenge, Letter from
the Editor, Notices of the American Mathematical Society,
June, 1996, p. 652.
- S. Landau, "Joseph Rotblat: From Fission Research
to a Prize for Peace,"
Scientific American, Jan. 1996, pp. 38-39.
-
S. Landau, Joseph
Rotblat: The Road Less Traveled,
Bulletin of the Atomic Scientists, Jan.-Feb. 1996, pp. 46-54.
- S. Landau, Something
There is That Doesn't Love a Wall, Letter from
the Editor, Notices of the American Mathematical Society,
Nov. 1995, p. 1268.
- S. Landau, Letter
from the Editor, Notices of the American Mathematical Society,
May 1995, p. 524.
- S. Landau, "The Secret of Life is a Nontrivial
Computation," SIAM
News, May 1991, pp. 12-13.
- S. Landau, "The Responsible Use of `Expert' Systems," Proceedings
of the Symposium on Directions and Implications of Advanced
Computing (1987), pp. 167-181. Also appeared in Directions and
Implications of Advanced Computing, Vol. 1, Ablex Publishing
Corp. (1989), pp. 191-202.
- S. Landau, What's Doing in Ithaca, New York, New York Times, Sept. 9, 1979, Section X, p. 7.
- Judith F. Gilsinn and Susan
Landau, NBSIR 74-633, The
NBS Computerized Carpool Matching System: Users' Guide,
Applied Math Division, Institute for Basic Standards, Operations
Research Section, National Bureau of Standards, December 1974.
Podcasts
- Is Contact Tracing a Privacy Threat?, The Lawfare Podcast, April 18, 2020.
- Moving
the Encryption Policy Conversation Forward, The Lawfare Podcast, October 8, 2019.
- Conversations about Software
Engineering: Security and Privacy with Susan Landau, April 19, 2018.
- Decoding
the Cyber Era with Susan Landau, The Fletcher Forum of World
Affairs, April 12, 2018.
- Tech
Talk: Cybersecurity in an Insecure Age, Tech Talks with Brian
Wesolowski, Center for Democracy and Technology, March 28, 2018.
- The Cyberlaw Podcast: Interview with Susan Landau, February 15, 2018.
- Books, et al., Q& A with Susan Landau, author of Listening In, November 24, 2017.
- Security
by the Book: Susan Landau on Listening In,The Lawfare Podcast,
November 7, 2017.
- Security Mom: The Podcast about
Our Homeland, Decrypting Encryption, October 8, 2015.
|
|