-
1
-
-
0347227352
-
-
FIPS Publication 185: Escrowed Encryption Standard. February
-
National Institute of Standards and Technology. FIPS Publication 185: Escrowed Encryption Standard. February 1994.
-
(1994)
National Institute of Standards and Technology
-
-
-
2
-
-
85062838317
-
Safeguarding cryptographic keys
-
June, Arlington, Va
-
G. R. Blakley. Safeguarding cryptographic keys. In the Proceedings of AFIPS 1979 NCC, Vol. 48, Arlington, Va., pages 313-317, June 1979.
-
(1979)
The Proceedings of AFIPS 1979 NCC
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
3
-
-
0029513859
-
Key distribution without individual trusted authentication servers
-
IEEE Computer Society Press, Los Alamitos, California, June
-
L. Chen, D. Gollmann, and C. Mitchell. Key distribution without individual trusted authentication servers. In Proceedings: the 8th IEEE Computer Security Foundations Workshop, pages 30-36. IEEE Computer Society Press, Los Alamitos, California, June 1995.
-
(1995)
Proceedings: The 8th IEEE Computer Security Foundations Workshop
, pp. 30-36
-
-
Chen, L.1
Gollmann, D.2
Mitchell, C.3
-
4
-
-
0030107190
-
A taxonomy for key escrow encryption systems
-
D. E. Denning and D. K. Branstad. A taxonomy for key escrow encryption systems. Communications of the ACM. 39(3): 34-40, 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.3
, pp. 34-40
-
-
Denning, D.E.1
Branstad, D.K.2
-
6
-
-
84957693910
-
Escrow encryption systems visited: Attacks, analysis and designs
-
D. Coppersmith, editor,. Springer-Verlag
-
Y. Frankel and M. Yung. Escrow encryption systems visited: attacks, analysis and designs. In D. Coppersmith, editor, Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95, pages 222-235. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95
, pp. 222-235
-
-
Frankel, Y.1
Yung, M.2
-
7
-
-
0027617271
-
Increasing availability and security of an authentication service
-
L. Gong. Increasing availability and security of an authentication service. IEEE Journal on Selected Areas in Communications, 11: 657-662, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, pp. 657-662
-
-
Gong, L.1
-
8
-
-
84955565977
-
A proposed architecture for trusted third party services
-
E. Dawson and J. Golić, editors,. Springer-Verlag
-
N. Jefferies, C. Mitchell, and M. Walker. A proposed architecture for trusted third party services. In E. Dawson and J. Golić, editors, Lecture Notes in Computer Science 1029, Cryptography: Policy and algorithms Conference, pages 98-104. Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science 1029, Cryptography: Policy and algorithms Conference
, pp. 98-104
-
-
Jefferies, N.1
Mitchell, C.2
Walker, M.3
-
9
-
-
84957640277
-
Fair cryptosystems, revisited
-
D. Coppersmith, editor,. Springer-Verlag
-
J. Kilian and T. Leighton. Fair cryptosystems, revisited. In D. Coppersmith, editor, Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95, pages 208-221. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95
, pp. 208-221
-
-
Kilian, J.1
Leighton, T.2
-
10
-
-
84947439162
-
A key escrow system with warrant bounds
-
D. Coppersmith, editor,. Springer-Verlag
-
A. K. Lenstra, P. Winkler, and Y. Yacobi. A key escrow system with warrant bounds. In D. Coppersmith, editor, Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95, pages 197-207. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95
, pp. 197-207
-
-
Lenstra, A.K.1
Winkler, P.2
Yacobi, Y.3
-
11
-
-
84957658795
-
A simple method for generating and sharing pseudorandom functions, with applications to clipper-like key escrow systems
-
D. Coppersmith, editor,. Springer-Verlag
-
S. Micali and R. Sidney. A simple method for generating and sharing pseudorandom functions, with applications to clipper-like key escrow systems. In D. Coppersmith, editor, Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95, pages 185-196. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95
, pp. 185-196
-
-
Micali, S.1
Sidney, R.2
-
12
-
-
0030270929
-
A public-key based key escrow system
-
to appear October
-
J. Nechvatal. A public-key based key escrow system. Journal of Systems and Software, to appear October 1996.
-
(1996)
Journal of Systems and Software
-
-
Nechvatal, J.1
-
13
-
-
84876222959
-
Distributed provers with applications to undeniable signatures
-
D.W. Davies, editor,. Berlin: Springer-Verlag
-
T. P. Pedersen. Distributed provers with applications to undeniable signatures. In D. W. Davies, editor, Lecture Notes in Computer Science 547, Advances in Cryptology: Proc. Eurocrypt '91, pages 221-238. Berlin: Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science 547, Advances in Cryptology: Proc. Eurocrypt '91
, pp. 221-238
-
-
Pedersen, T.P.1
-
15
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22: 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|