-
1
-
-
0030107190
-
A taxonomy for key Escrow encryption systems
-
March
-
D.E. Denning and D.K. Branstad, "A Taxonomy for Key Escrow Encryption Systems," Communications of the ACM,Vol.39, No. 3, pp. 34-40, March 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.3
, pp. 34-40
-
-
Denning, D.E.1
Branstad, D.K.2
-
2
-
-
0040075289
-
Key Escrow encryption policies and technologies
-
Summer
-
D.E. Denning and W.E. Baugh, "Key Escrow Encryption Policies and Technologies," Information System Security,Vol. 5, No. 2, pp. 44-51, Summer 1996.
-
(1996)
Information System Security
, vol.5
, Issue.2
, pp. 44-51
-
-
Denning, D.E.1
Baugh, W.E.2
-
4
-
-
21844503738
-
When technology and privacy collide. Encoded encryption and the clipper chip
-
E.H. Freeman, "When Technology and Privacy Collide. Encoded Encryption and the Clipper Chip," Information System Management, Vol. 12, No. 2, pp. 43-46, 1995.
-
(1995)
Information System Management
, vol.12
, Issue.2
, pp. 43-46
-
-
Freeman, E.H.1
-
5
-
-
0028484846
-
Crypto policy perspectives
-
August
-
S. Landau, S. Kent, C. Brooks, S. Charney, D. Denning, W. Diffie, A. Lauck, D. Miller, P. Neumann, D. Sobel, "Crypto Policy Perspectives," Communications of the ACM, Vol. 37, No. 8, pp. 115-121, August 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.8
, pp. 115-121
-
-
Landau, S.1
Kent, S.2
Brooks, C.3
Charney, S.4
Denning, D.5
Diffie, W.6
Lauck, A.7
Miller, D.8
Neumann, P.9
Sobel, D.10
-
6
-
-
0030270929
-
A public key based key Escrow system
-
October
-
J. Nechvatal, "A Public Key Based Key Escrow System," Journal of System Software, Vol. 35, No. 1, pp. 73-83, October 1996.
-
(1996)
Journal of System Software
, vol.35
, Issue.1
, pp. 73-83
-
-
Nechvatal, J.1
-
8
-
-
0030108137
-
Commercial key recovery
-
March
-
S.T. Walker, S.B. Lipner, C.M. Ellison, D.M. Balenson, "Commercial Key Recovery," Communications of the ACM, Vol. 39, No. 3, pp. 41-47, March 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.3
, pp. 41-47
-
-
Walker, S.T.1
Lipner, S.B.2
Ellison, C.M.3
Balenson, D.M.4
-
9
-
-
0010216321
-
Fair public key cryptosystems
-
S. Micali, "Fair Public Key Cryptosystems," Proceedings of CRYPTO '92, pp.113-138, 1992.
-
(1992)
Proceedings of CRYPTO '92
, pp. 113-138
-
-
Micali, S.1
-
10
-
-
84957693910
-
Escrow encryption systems visited: Attacks, analysis and designs
-
Y. Frankel and M. Yung, "Escrow Encryption Systems Visited: Attacks, Analysis and Designs," Proceedings of CRYPTO '95, pp.222-235, 1995.
-
(1995)
Proceedings of CRYPTO '95
, pp. 222-235
-
-
Frankel, Y.1
Yung, M.2
-
12
-
-
0039483572
-
Enhanced optimal asymmetric encryption: Reverse signatures and ANSI X9.44
-
D.B. Johnson and S.M. Matyas, "Enhanced Optimal Asymmetric Encryption: Reverse Signatures and ANSI X9.44," Proceedings of RSA Data Security, 1996.
-
(1996)
Proceedings of RSA Data Security
-
-
Johnson, D.B.1
Matyas, S.M.2
-
13
-
-
0023984964
-
How to construct pseudo-random permutations from pseudo-random functions
-
April
-
M. Luby, C. Rackoff, "How to construct pseudo-random permutations from pseudo-random functions," SLAM Journal of Computing, Vol. 17, No. 2, pp. 373-386, April 1988.
-
(1988)
SLAM Journal of Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
14
-
-
0030416137
-
Pseudo-random functions revisited, the cascade construction and its concrete security
-
M. Bellare, R. Canetti, and H. Krawczyk, "Pseudo-random functions revisited, the cascade construction and its concrete security," Proceedings of the 37th Conference on Foundations of Computer Science, pp. 514-523, 1996.
-
(1996)
Proceedings of the 37th Conference on Foundations of Computer Science
, pp. 514-523
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
|