참고문헌
- The Risks of Key Escrow and Trusted Third-Party Encryption Hal Abelson;Ross Anderson;Steven M.Bellovin;Josh Benaloh;Matt Blaze;Whitfield Diffie;John Gilmore;Peter G.Neumann;Ronald L.Rivest;Jeffrey I. Schiller;Bruce Schneier
- Communications of the ACM v.39 Commercial Key Recovery Stephen T. Walker;Steven B. Lipner;Carl M. Ellison;David M. Balenson
- Communications of the ACM v.39 Crypto Backup and Key Escrow David Paul Maher
- Communications of the ACM v.39 The Yaksha Security System Ravi Ganesan
- Advances in Cryptology-CRYPTO '91 Proceddings Non-interactive and information-theoretic secure verifiable secret sharing Torben Pryds Pedersen
- Communications of the ACM v.39 A Taxonomy for Key Recovery Encryption System Dorothy E.Denning
- IEEE Communications v.32 Key Escrowing Today Dorothy E. Denning;Miles Smid
- Securing electronic mail within HMG part Ⅰ. Infrastructure and protocol
- Advances in Cryptology-CRYPTO '92 Fair Cryptosystems Silvio Micali
- EURO-CRYPTO '97 The GCHQ protocol and it's problems Ross Anderson
- Communications of the ACM v.39 Commercial Key Recovery Stephen T. Walker;Steven B. Lipner;Carl M. Ellison;David M. Balenson
- IBM Technical document Secure Key Recovery Rosario Gennaro;Don Johnson;Paul Karger;Mike Matyas;Mohammad Peyravian;Allen Roginsky;David Safford;Michael Willet;Moti Yung;Nev Zunic
- IEEE Communications Magazine Key escrowing today Dorothy E. Denning;Miles Smid
- CRYPTO 95 Fair Cryptosystems, Revisited Joe Kilian;Tom Leghton
- Computer Law and Security Report Binding Cryptography: A Fraud-Detectable Alternative to Key-Escrow Solutions A. van Tilborg
- Computer Communications The U. S. Key Escrow Encryption Technology Dorothy E. Denning
- Statement of the Vice President The White House, Office of the Vice President
- TIS Report #541 Trusted Information Systems, Commercial Key Escrow : Something for Everyone, Now and for the Future
- 통신망정보보호 최용락;소우영;이재광;이임영
- Translucent Cryptography - An Alternative to Key Escrow, and it's Implementation via Fractional Oblivious Transfer Mihir Bellare;Ronald L. Rivest
- 한국통신정보보호 학회지 v.7 no.4 Key recovery 시스템에 관한 고찰 이임영;채승철