참고문헌
- Report of the TACD-FIPSFKMI Requirements for key recovery products
- The Communications of the ACM v.39 no.3 A Taxonomy for Key Escrow Encryption Systems Dorothy E. Denning
- Federal Information Processing Standards Publication 185 Escrowed Encryption Standard NIST
- The 2nd ACM Conference on Computer and Commucivations Security Protocol Failure in the Escrowed Encryption Standard Matt Blaze
- Crypto'95.Lecture Notes in Computer Science. LNCS 963 Escrow Encryption Systems Visited : Attacks, Analysis and Designs Yair Frankel;Moti Yung
- Building in Big Brother : The Cryprographic Policy Dabate A New Approach to Software Key Escrow Encryption David M. Balenson;Carl M. Elli son;Steven B. Lipner;Stephen T. Walker
- TIP Report no. 541 Commercial Key Escrow :something for everyone now and for the future Stephen T. Walker;Steven B. Lipner;Carl M. Ellison;Dennis K. Brastad;David M. Balenson
- The 2nd ACM Conference on Computer and Commucications Security Towards Acceptable Key Escrow Systems T. Beth;H. J. Knobloch;M. Otten;G. Simmons;P. Wichmann
- Proc. of Securicom A New Key Escrow System with Active Investigator Patrick Horster;Markus Michels;Holger Petersen
- Proc. of ISW'99. Information Security Workshop On the Difficulty of Key Recovery Systems S. J. Kim;I. S. Lee;M. Mambo;S. J. Park
- Crypto'92.Lecture Notes in Computer Science. LNCS 740 Fair public-key crypto systems Sivio Micali
- Crypto'95. Lecture Noted in Computer Science v.963 Fair Cryptosystems. Revisited Joseph Kilian;Tom Leighton
- Eurocrypt'97. Lecture Notes in Computer Science. LNCS 1233 Binding ElGamal: A Fraud Detectable Alternative to Key-Escrow Proposals Eric Verheul;Henk C.A. van Tilborg
- ACM Operating Systems Review 32 How to Break Fraud Detectable Key Recovery Birgit Pfitzmann;Michael Waidner
- Eurocrypt'97. Lecture Notes in Computer Science. LNCS 1233 The GCHQ Protocol and its Problems Ross Anderson;Michael Roe
- Partial key escrow: A new approach to software key escrow Adi Shamir
- The 4th ACM Conference on Computer and Communications Security Mihir Bellare;Shafi Goldwasser
- 통신정보보호학회 논문지 v.9 no.2 안전한 키 위탁 시스템에 관한 연구 채승철;이임영