-
1
-
-
26144449189
-
The risks of key recovery, key escrow, and trusted third-party encryption
-
Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P.G., Rivest, R.L., Schiller, J.I., Schneier, B.: The risks of key recovery, key escrow, and trusted third-party encryption. World Wide Web Journal 2(3), 241-257 (1997)
-
(1997)
World Wide Web Journal
, vol.2
, Issue.3
, pp. 241-257
-
-
Abelson, H.1
Anderson, R.2
Bellovin, S.M.3
Benaloh, J.4
Blaze, M.5
Diffie, W.6
Gilmore, J.7
Neumann, P.G.8
Rivest, R.L.9
Schiller, J.I.10
Schneier, B.11
-
2
-
-
84881457442
-
-
US Patent 6,931,133, August
-
Andrews, R.F., Huang, Z., Ruan, T.Q.X., et al.: Method and system of securely escrowing private keys in a public key infrastructure. US Patent 6,931,133 (August 2005)
-
(2005)
Method and System of Securely Escrowing Private Keys in A Public Key Infrastructure
-
-
Andrews, R.F.1
Huang, Z.2
Ruan, T.Q.X.3
-
3
-
-
84881449639
-
-
US Patent 6,185,308 (February 6)
-
Ando, H., Morita, I., Kuroda, Y., Torii, N., Yamazaki, M., Miyauchi, H., Sako, K., Domyo, S., Tsuchiya, H., Kanno, S., et al.: Key recovery system. US Patent 6,185,308 (February 6, 2001)
-
(2001)
Key Recovery System
-
-
Ando, H.1
Morita, I.2
Kuroda, Y.3
Torii, N.4
Yamazaki, M.5
Miyauchi, H.6
Sako, K.7
Domyo, S.8
Tsuchiya, H.9
Kanno, S.10
-
4
-
-
84924142975
-
-
Cambridge University Press
-
Abiteboul, S., Manolescu, I., Rigaux, P., Rousset, M.C., Senellart, P.: Web data management. Cambridge University Press (2011)
-
(2011)
Web Data Management
-
-
Abiteboul, S.1
Manolescu, I.2
Rigaux, P.3
Rousset, M.C.4
Senellart, P.5
-
7
-
-
35248863066
-
New partial key exposure attacks on RSA
-
Boneh, D. (ed.) Springer, Heidelberg
-
Blomer, J., May, A.: New partial key exposure attacks on RSA. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 27-43. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 27-43
-
-
Blomer, J.1
May, A.2
-
8
-
-
84881472723
-
-
US Patent 6,335,972 (January 1)
-
Chandersekaran, S., Gupta, S.: Framework-based cryptographic key recovery system. US Patent 6,335,972 (January 1, 2002)
-
(2002)
Framework-based Cryptographic Key Recovery System
-
-
Chandersekaran, S.1
Gupta, S.2
-
10
-
-
84881455033
-
-
US Patent 6,877,092 (April 5)
-
Chandersekaran, S., Malik, S., Muresan, M., Vasudevan, N.: Apparatus, method, and computer program product for achieving interoperability between cryptographic key recovery enabled and unaware systems. US Patent 6,877,092 (April 5, 2005)
-
(2005)
Apparatus, Method, and Computer Program Product for Achieving Interoperability between Cryptographic Key Recovery Enabled and Unaware Systems
-
-
Chandersekaran, S.1
Malik, S.2
Muresan, M.3
Vasudevan, N.4
-
14
-
-
84874049421
-
Key escrow encryption policies and technologies
-
Denning, D.E., Baugh Jr., W.E.: Key escrow encryption policies and technologies. Villanova Law Review 41, 289 (1996)
-
(1996)
Villanova Law Review
, vol.41
, pp. 289
-
-
Denning, D.E.1
Baugh Jr., W.E.2
-
15
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
Brickell, E.F. (ed.) Springer, Heidelberg
-
Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
-
(1993)
CRYPTO 1992. LNCS
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
16
-
-
84881451048
-
-
US Patent 20,120,321,086 (December 20)
-
D'Souza, R.P., Pandey, O.: Cloud key escrow system. US Patent 20,120,321,086 (December 20, 2012)
-
Cloud Key Escrow System
, pp. 2012
-
-
D'Souza, R.P.1
Pandey, O.2
-
17
-
-
24944544867
-
Partial key exposure attacks on RSA up to full size exponents
-
Cramer, R. (ed.) Springer, Heidelberg
-
Ernst, M., Jochemsz, E., May, A., de Weger, B.: Partial key exposure attacks on RSA up to full size exponents. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 371-386. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005. LNCS
, vol.3494
, pp. 371-386
-
-
Ernst, M.1
Jochemsz, E.2
May, A.3
De Weger, B.4
-
18
-
-
84866754231
-
Key escrow attack risk and preventive measures
-
Fan, Q., Zhang, M., Zhang, Y.: Key escrow attack risk and preventive measures. Research Journal of Applied Sciences 4 (2012)
-
Research Journal of Applied Sciences
, vol.4
, pp. 2012
-
-
Fan, Q.1
Zhang, M.2
Zhang, Y.3
-
19
-
-
0031332511
-
Two-phase cryptographic key recovery system
-
Gennaro, R., Karger, P., Matyas, S., Peyravian, M., Roginsky, A., Safford, D., Willett, M., Zunic, N.: Two-phase cryptographic key recovery system. Computers & Security 16(6), 481-506 (1997)
-
(1997)
Computers & Security
, vol.16
, Issue.6
, pp. 481-506
-
-
Gennaro, R.1
Karger, P.2
Matyas, S.3
Peyravian, M.4
Roginsky, A.5
Safford, D.6
Willett, M.7
Zunic, N.8
-
20
-
-
0033639614
-
A common key recovery block format: Promoting interoperability between dissimilar key recovery mechanisms
-
Gupta, S.: A common key recovery block format: Promoting interoperability between dissimilar key recovery mechanisms. Computers & Security 19(1), 41-47 (2000)
-
(2000)
Computers & Security
, vol.19
, Issue.1
, pp. 41-47
-
-
Gupta, S.1
-
21
-
-
84881473532
-
-
US Patent 6,052,469 (April 18)
-
Johnson, D.B., Karger, P.A., Kaufman Jr., C.W., Matyas Jr., S.M., Safford, D.R., Yung,M.M., Zunic, N.: Interoperable cryptographic key recovery system with verification by comparison. US Patent 6,052,469 (April 18, 2000)
-
(2000)
Interoperable Cryptographic Key Recovery System with Verification by Comparison
-
-
Johnson, D.B.1
Karger, P.A.2
Kaufman Jr., C.W.3
Matyas Jr., S.M.4
Yungm, R.S.D.5
Zunic, N.6
-
22
-
-
77957947378
-
LH*RE: A scalable distributed data structure with recoverable encryption
-
IEEE Computer Society, Washington, DC
-
Jajodia, S., Litwin, W., Schwarz, T.: LH*RE: A scalable distributed data structure with recoverable encryption. In: CLOUD 2010: Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing, pp. 354-361. IEEE Computer Society, Washington, DC (2010)
-
(2010)
CLOUD 2010: Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing
, pp. 354-361
-
-
Jajodia, S.1
Litwin, W.2
Schwarz, T.3
-
23
-
-
84855206756
-
Gpu-based single-cluster algorithm for the simulation of the ising model
-
Komura, Y., Okabe, Y.: Gpu-based single-cluster algorithm for the simulation of the ising model. Journal of Computational Physics 231(4), 1209-1215 (2012)
-
(2012)
Journal of Computational Physics
, vol.231
, Issue.4
, pp. 1209-1215
-
-
Komura, Y.1
Okabe, Y.2
-
24
-
-
84871952000
-
Practical client puzzles in the standard model
-
ASIACCS 2012. ACM, New York
-
Kuppusamy, L., Rangasamy, J., Stebila, D., Boyd, C., Nieto, J.G.: Practical client puzzles in the standard model. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012. ACM, New York (2012)
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
-
-
Kuppusamy, L.1
Rangasamy, J.2
Stebila, D.3
Boyd, C.4
Nieto, J.G.5
-
25
-
-
80955157835
-
Privacy of data outsourced to a cloud for selected readers through client-side encryption
-
ACM, New York
-
Litwin,W., Jajodia, S., Schwarz, T.: Privacy of data outsourced to a cloud for selected readers through client-side encryption. In: WPES 2011: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 171-176. ACM, New York (2011)
-
(2011)
WPES 2011: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society
, pp. 171-176
-
-
Litwin, W.1
Jajodia, S.2
Schwarz, T.3
-
26
-
-
0030400983
-
Lh&z.ast; - A scalable, distributed data structure
-
Litwin,W., Neimat, M.A., Schneider, D.A.: Lh&z.ast; - a scalable, distributed data structure. ACM Transactions on Database Systems (TODS) 21(4), 480-525 (1996)
-
(1996)
ACM Transactions on Database Systems (TODS)
, vol.21
, Issue.4
, pp. 480-525
-
-
Litwin, W.1
Neimat, M.A.2
Schneider, D.A.3
-
27
-
-
3242781275
-
-
Office of Management and Budget, Interagency Working Group on Cryptography Policy, Washington, DC
-
McConnell, B.W., Appel, E.J.: Enabling privacy, commerce, security and public safety in the global information infrastructure. Office of Management and Budget, Interagency Working Group on Cryptography Policy, Washington, DC (1996)
-
(1996)
Enabling Privacy, Commerce, Security and Public Safety in the Global Information Infrastructure
-
-
McConnell, B.W.1
Appel, E.J.2
-
28
-
-
85084162873
-
Strong security for network-attached storage
-
USENIX Association
-
Miller, E.L., Long, D.D.E., Freeman, W.E., Reed, B.C.: Strong security for network-attached storage. In: Proceedings of the 1st USENIX Conference on File and Storage Technologies, p. 1. USENIX Association (2002)
-
(2002)
Proceedings of the 1st USENIX Conference on File and Storage Technologies
, pp. 1
-
-
Miller, E.L.1
Long, D.D.E.2
Freeman, W.E.3
Reed, B.C.4
-
29
-
-
49049088756
-
Gpu computing
-
Owens, J.D., Houston, M., Luebke, D., Green, S., Stone, J.E., Phillips, J.C.: Gpu computing. Proceedings of the IEEE 96(5), 879-899 (2008)
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.5
, pp. 879-899
-
-
Owens, J.D.1
Houston, M.2
Luebke, D.3
Green, S.4
Stone, J.E.5
Phillips, J.C.6
-
30
-
-
0010602889
-
-
Technical report, Massachusetts Institute of Technology, Cambridge, MA, USA
-
Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timedrelease crypto. Technical report, Massachusetts Institute of Technology, Cambridge, MA, USA (1996)
-
(1996)
Time-lock Puzzles and Timedrelease Crypto
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
31
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
32
-
-
0347316182
-
The piracy of privacy-a fourth amendment analysis of key escrow cryptography
-
Singhal, A.: The piracy of privacy-a fourth amendment analysis of key escrow cryptography. Stanford Law and Policy Review 7, 189 (1995)
-
(1995)
Stanford Law and Policy Review
, vol.7
, pp. 189
-
-
Singhal, A.1
-
34
-
-
84957370092
-
Binding ElGamal: A fraud-detectable alternative to key-escrow proposals
-
Fumy, W. (ed.) Springer, Heidelberg
-
Verheul, E.R., van Tilborg, H.C.A.: Binding ElGamal: A fraud-detectable alternative to key-escrow proposals. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 119-133. Springer, Heidelberg (1997)
-
(1997)
EUROCRYPT 1997. LNCS
, vol.1233
, pp. 119-133
-
-
Verheul, E.R.1
Van Tilborg, H.C.A.2
|