References
- Report of the TACD-FIPSFKMI Requirements for key recovery products
- The Communication of the ACM v.39 no.3 A Taxonomy for Key Escrow Encryption Systems Dorothy E. Denning
- Federal Information Processing Standard Publication v.185 Escrowed Encryption Standard NIST
- The 2nd ACM Conference on Computer and Communications Security Protocol Failure in the Escrowed Encryption Standard Matt Blaze
- Crypto'95 v.LNCS 963 Escrow Encryption Systems Visited : Attacks, Analysis and Design Yair Frankel;Moti Yung
- Building in Big Brother : The Cryptographic Policy Dabate A New Approach to Software Key Escrow Encryption David M. Balenson;Carl M. Elli son;Steven B. Lipner;Stephen T. Walker
- TIS Report no. 541 Commercial Key Escrow : something for everyone now and for the future Stephen T. Walker;Steven B. Lipner;Carl M. Ellison;Dennis K. Branstad;David M. Balenson
- The 2nd ACM Conference on Computer and Communications Security Towards Acceptable Key Escrow Systems T. Beth;H.J. Knobloch;M. Otten;G. Simmons;P. Wichmann
- Proc. of Securicom A New Key Escrow System with Active Investigator Patrick Horster;Markus Michels;Holger Petersen
- Proc. of ISW'99 On the Difficulty of Key Recovery Systems S.J. Kim;I.S. Lee;M. Mambo;S.J. Park
- Crypto'92 v.LNCS 740 Fair public-key crypto-systems Sivio Micali
- Crypto'95 v.963 Fair Cryptosystems, Revisited Joseph Kilian;Tom Leighton
- Eurocrypt'97 v.LNCS 1233 Binding EIGamal : A Fraud Detectable Alternative to Key-Escrow Proposals Eric Verheul;Henk C.A. van Tilborg
- ACM Operating Systems Review v.32 How to Break Fraud Detectable Key Recovery Birgit Pfitzmann;Michael Waidner
- Eurocrypt'97 v.LNCS 1233 The GCHQ Protocol and its Problems Ross Anderson;Michael Roe
- Key escrow conference Partial key escrow : A new approach to software key escrow Adi Shamir
- The 4th ACM Conference on Computer and Communications Security Verifiable Partial Key Escrow Mihir Bellare;Shafi Goldwasser
- 통신정보보호학회 학회지 v.9 no.2 안전한 키 위탁 시스템에 관한 연구 채승철;이임영