References
- 한국통신정보보호학회지 v.4 no.4 미국의 암호정책에 관한 연구-클리퍼칩을 중심으로 한상근;이영
- The Risks of Key Escrow an Trusted Third-Party Encryption Hal Abelson;Ross Anderson;Steven M.Bellovin;Josh Benaloh;Matt Blaze;Whitfield Diffie;John Gilmore;Peter G.Neumann;Ronald L.Rivest;Jeffrey I.Schiller;Bruce Schneier
- IEEE Communications Magazine Key escrowing today Dorothy E. Denning;Miles Smid
- Notes from the Key Escrow Conference Prrtial Key Escrow: A New Approach to Software Key Escrow Adi Shamir
- Communications of the ACM Timestamps in Key Distribution Protocols Dorothy E. Denning
- Computer Communication The U. S. Key Escrow Encryption Technology Dorothy E. Denning
- IEEE Transacions on Information Theory A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms T. ElGamal
- IEEE Communications Magazine An Overview of public key Cryptography M. Hellman
- Interagency Working Group on Cryptographic Policy, Enabling Privacy, Commerce, Security, and Public Safety in the Global Information Infrastructure
- SKIPJACK Review Interim Report
- The White House;Office of the Press Secretary;Statement of the Press Secretary
- The White House;Office of the Press Secretary;Statement of the Press Secretary
- The White House;Office of the Vice President;Statement of the Vice President
- TIS Report #541 Trusted Information Systems, Commercial Key Escrow : Something for Everyone, Now and for the Future
- Communications of ACM v.39 no.3 A Taxonomy for Key Escrow Encryption Systems D. Denning;D. Brandstad
- Building Big Brother Fair Crytposystems Silvio Micali;L. Hoffman(ed.)