메뉴 건너뛰기




Volumn 2851, Issue , 2003, Pages 165-179

The design and implementation of protocol-based hidden key recovery

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM RECOVERY; CRYPTOGRAPHY; DESIGN; NETWORK SECURITY; SECURITY OF DATA;

EID: 35248841071     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10958513_13     Document Type: Article
Times cited : (18)

References (24)
  • 1
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • H. Krawczyk, editor, Proceedings of Crypto 1998, Springer-Verlag, Aug
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In H. Krawczyk, editor, Proceedings of Crypto 1998, volume 1462 of LNCS, pages 26-45. Springer-Verlag, Aug 1998.
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 3
    • 0032687056 scopus 로고    scopus 로고
    • Secure computation with honest-looking parties: What if nobody is truly honest?
    • ACM, ACM Press, May
    • R. Canetti and R. Ostrovsky. Secure computation with honest-looking parties: What if nobody is truly honest? In Proceedings of the 31st Symposium on Theory of Computing, pages 255-264. ACM, ACM Press, May 1999.
    • (1999) Proceedings of the 31st Symposium on Theory of Computing , pp. 255-264
    • Canetti, R.1    Ostrovsky, R.2
  • 4
    • 84855621167 scopus 로고    scopus 로고
    • Technical report, Georgetown University, Feb
    • D. Denning. Descriptions of key escrow systems. Technical report, Georgetown University, Feb 1997. http://www.cs.georgetown.edu/∼denning/.
    • (1997) Descriptions of Key Escrow Systems
    • Denning, D.1
  • 5
  • 6
    • 85031800805 scopus 로고
    • Abuses in cryptography and how to fight them
    • S. Goldwasser, editor, Proceedings of Crypto 1988, Springer-Verlag, Aug
    • Y. Desmedt. Abuses in cryptography and how to fight them. In S. Goldwasser, editor, Proceedings of Crypto 1988, volume 403 of LNCS, pages 375-389. Springer-Verlag, Aug 1988.
    • (1988) LNCS , vol.403 , pp. 375-389
    • Desmedt, Y.1
  • 7
    • 85028745474 scopus 로고
    • Special uses and abuses of the Fiat-Shamir passport protocol
    • C. Pomerance, editor, Proceedings of Crypto 1987, Springer-Verlag, Aug
    • Y. Desmedt, G. Goutier, and S. Bengio. Special uses and abuses of the Fiat-Shamir passport protocol. In C. Pomerance, editor, Proceedings of Crypto 1987, volume 293 of LNCS, pages 21-39. Springer-Verlag, Aug 1987.
    • (1987) LNCS , vol.293 , pp. 21-39
    • Desmedt, Y.1    Goutier, G.2    Bengio, S.3
  • 12
    • 84957640277 scopus 로고
    • Fair cryptosystems, revisited: A rigorous approach to key-escrow
    • D. Coppersmith, editor, Proceedings of Crypto 1995, Springer-Verlag, Aug
    • J. Kilian and T. Leighton. Fair cryptosystems, revisited: A rigorous approach to key-escrow. In D. Coppersmith, editor, Proceedings of Crypto 1995, volume 963 of LNCS, pages 208-221. Springer-Verlag, Aug 1995.
    • (1995) LNCS , vol.963 , pp. 208-221
    • Kilian, J.1    Leighton, T.2
  • 14
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct
    • B. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, Oct 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 15
    • 0027663154 scopus 로고
    • Elliptic curve cryptosystems and their implementations
    • A. J. Menezes and S. A. Vanstone. Elliptic curve cryptosystems and their implementations. Journal of Cryptology, 6(4):209-224, 1993.
    • (1993) Journal of Cryptology , vol.6 , Issue.4 , pp. 209-224
    • Menezes, A.J.1    Vanstone, S.A.2
  • 16
    • 0003584029 scopus 로고    scopus 로고
    • FIPS 140-2, NIST, Jun
    • National Institute of Standards and Technology. Security requirements for cryptographic modules. FIPS 140-2, NIST, Jun 2001. http://csrc.nist.gov/publications/fips/.
    • (2001) Security Requirements for Cryptographic Modules
  • 17
    • 84855632678 scopus 로고    scopus 로고
    • OpenSSL Project. http://www.openssl.org/.
  • 20
    • 84855632676 scopus 로고    scopus 로고
    • secsh IETF Working Group. http://www.ietf.org/html.charters/secsh-charter.html.
  • 21
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • D. Chaum, editor, Plenum Press, Aug
    • G. J. Simmons. The prisoners' problem and the subliminal channel. In D. Chaum, editor, Proceedings of Crypto 1983, pages 51-67. Plenum Press, Aug 1983.
    • (1983) Proceedings of Crypto 1983 , pp. 51-67
    • Simmons, G.J.1
  • 22
    • 84985824882 scopus 로고
    • The subliminal channel and digital signatures
    • T. Beth, N. Cot, and I. Ingemarsson, editors, Proceedings of Eurocrypt 1984, Springer-Verlag, Apr
    • G. J. Simmons. The subliminal channel and digital signatures. In T. Beth, N. Cot, and I. Ingemarsson, editors, Proceedings of Eurocrypt 1984, volume 0209 of LNCS, pages 364-378. Springer-Verlag, Apr 1984.
    • (1984) LNCS , vol.209 , pp. 364-378
    • Simmons, G.J.1
  • 23
    • 84955586344 scopus 로고    scopus 로고
    • The dark side of "black-box" cryptography, or: Should we trust Capstone
    • N. Koblitz, editor, Proceedings of Crypto 1996, Springer-Verlag, Aug
    • A. Young and M. Yung. The dark side of "black-box" cryptography, or: Should we trust Capstone. In N. Koblitz, editor, Proceedings of Crypto 1996, volume 1109 of LNCS, pages 89-103. Springer-Verlag, Aug 1996.
    • (1996) LNCS , vol.1109 , pp. 89-103
    • Young, A.1    Yung, M.2
  • 24
    • 84957360674 scopus 로고    scopus 로고
    • Kleptography: Using cryptography against cryptography
    • W. Fumy, editor, Proceedings of Eurocrypt 1997, Springer-Verlag, May
    • A. Young and M. Yung. Kleptography: Using cryptography against cryptography. In W. Fumy, editor, Proceedings of Eurocrypt 1997, volume 1233 of LNCS, pages 62-74. Springer-Verlag, May 1997.
    • (1997) LNCS , vol.1233 , pp. 62-74
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.