메뉴 건너뛰기




Volumn 16, Issue 6, 1997, Pages 481-506

Two-phase cryptographic key recovery system

Author keywords

Cryptography; Encryption; Key escrow; Key recovery; Public key; Security

Indexed keywords

DATA COMMUNICATION SYSTEMS; OPERATIONS RESEARCH; SECURITY OF DATA;

EID: 0031332511     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(97)84642-1     Document Type: Article
Times cited : (10)

References (15)
  • 1
    • 0030107190 scopus 로고    scopus 로고
    • A taxonomy for key Escrow encryption systems
    • March
    • D.E. Denning and D.K. Branstad, "A Taxonomy for Key Escrow Encryption Systems," Communications of the ACM,Vol.39, No. 3, pp. 34-40, March 1996.
    • (1996) Communications of the ACM , vol.39 , Issue.3 , pp. 34-40
    • Denning, D.E.1    Branstad, D.K.2
  • 2
    • 0040075289 scopus 로고    scopus 로고
    • Key Escrow encryption policies and technologies
    • Summer
    • D.E. Denning and W.E. Baugh, "Key Escrow Encryption Policies and Technologies," Information System Security,Vol. 5, No. 2, pp. 44-51, Summer 1996.
    • (1996) Information System Security , vol.5 , Issue.2 , pp. 44-51
    • Denning, D.E.1    Baugh, W.E.2
  • 4
    • 21844503738 scopus 로고
    • When technology and privacy collide. Encoded encryption and the clipper chip
    • E.H. Freeman, "When Technology and Privacy Collide. Encoded Encryption and the Clipper Chip," Information System Management, Vol. 12, No. 2, pp. 43-46, 1995.
    • (1995) Information System Management , vol.12 , Issue.2 , pp. 43-46
    • Freeman, E.H.1
  • 6
    • 0030270929 scopus 로고    scopus 로고
    • A public key based key Escrow system
    • October
    • J. Nechvatal, "A Public Key Based Key Escrow System," Journal of System Software, Vol. 35, No. 1, pp. 73-83, October 1996.
    • (1996) Journal of System Software , vol.35 , Issue.1 , pp. 73-83
    • Nechvatal, J.1
  • 9
    • 0010216321 scopus 로고
    • Fair public key cryptosystems
    • S. Micali, "Fair Public Key Cryptosystems," Proceedings of CRYPTO '92, pp.113-138, 1992.
    • (1992) Proceedings of CRYPTO '92 , pp. 113-138
    • Micali, S.1
  • 10
    • 84957693910 scopus 로고
    • Escrow encryption systems visited: Attacks, analysis and designs
    • Y. Frankel and M. Yung, "Escrow Encryption Systems Visited: Attacks, Analysis and Designs," Proceedings of CRYPTO '95, pp.222-235, 1995.
    • (1995) Proceedings of CRYPTO '95 , pp. 222-235
    • Frankel, Y.1    Yung, M.2
  • 12
    • 0039483572 scopus 로고    scopus 로고
    • Enhanced optimal asymmetric encryption: Reverse signatures and ANSI X9.44
    • D.B. Johnson and S.M. Matyas, "Enhanced Optimal Asymmetric Encryption: Reverse Signatures and ANSI X9.44," Proceedings of RSA Data Security, 1996.
    • (1996) Proceedings of RSA Data Security
    • Johnson, D.B.1    Matyas, S.M.2
  • 13
    • 0023984964 scopus 로고
    • How to construct pseudo-random permutations from pseudo-random functions
    • April
    • M. Luby, C. Rackoff, "How to construct pseudo-random permutations from pseudo-random functions," SLAM Journal of Computing, Vol. 17, No. 2, pp. 373-386, April 1988.
    • (1988) SLAM Journal of Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.