[4658] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: How to donate a clue to a lawyer?

daemon@ATHENA.MIT.EDU (Carl Ellison)
Sun May 9 17:51:50 1999

Date: Sun, 09 May 1999 06:59:13 -0700
To: Cryptography List <cryptography@c2.net>
From: Carl Ellison <cme@acm.org>
Cc: Carl Ellison <cme@acm.org>
In-Reply-To: <kj4slmg2d0.fsf@romeo.rtfm.com>

>From my declaration for the Bernstein case:

http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/Legal/960726_filing/ellison.decl

"        18. Attached hereto as Exhibit C is an excerpt from the August
1967 CACM, giving another example of an article which consists solely of
source code.

        19. In addition, the Exhibit C includes the August, 1967,
statement of the algorithm policy of the Association for Computer
Machinery.  The policy notes: 

        It is necessary, but not sufficient for the published algorithm 
        to operate on some machine and give correct answers.  It must also 
        communicate a method to the reader in a clear and unambiguous
        manner.  All contributions will be refereed by human beings and
        by an appropriate compiler.
"

That is, of course, not the only example.

+------------------------------------------------------------------+
|Carl M. Ellison         cme@acm.org     http://www.pobox.com/~cme |
|    PGP: 08FF BA05 599B 49D2  23C6 6FFD 36BA D342                 |
+--Officer, officer, arrest that man. He's whistling a dirty song.-+


home help back first fref pref prev next nref lref last post