References
- IBM SecureWay, 'Towards a Framework-based solution to Cryptographic Key Recovery,' available at http://www-4.ibm.com/software/security/library
- National Institute of Standards and Technology, 'Requirements for Key Recovery Products,' Report of the Technical Advisory Committee to Develop a Federal Information Processing Standard for the Federal Key Management Infrastructure, Available at http://csrc.nist.gov/keyrecovery, 1998
- NIST, 'Escrowed Encryption Standard,' Federal Information Processing Standards Publication 185, 1994
- David M. Balenson, Carl M. Ellison, Steven B. Lipner and Stephen T. Walker, 'A New Approach to Software Key Escrow Encryption,' Building in Big Brother; The Cryptographic Policy Debate, pp.180-207, Springer-Verlag, 1995
- Ross Anderson and Michael Roe, 'The GCHQ Protocol and its Problems,' Eurocrypt'97, pp.134-148, 1997
- Stephen T. Walker, Steven B. Lipner, Carl M. Ellison and David M. Balenson, 'Commercial Key Recovery,' Communications of the ACM, Vol.39, No.3, pp.41-47, 1996 https://doi.org/10.1145/227234.227240
- David Paul Maher, 'Crypto Backup and Key Escrow,' Corrununications of the ACM, Vol.39, No.3, pp.48-53, 1996 https://doi.org/10.1145/227234.227241
- Matt Blaze, 'Protocol Failure in the Escrowed Encryption Standard,' The 2nd ACM Conference on Computer and Corrununications Security, pp.59-67, 1994 https://doi.org/10.1145/191177.191193
- Yair Frankel and Moti Yung, 'Escrowed Encryption Systems Visited : Attacks, Analysis and Designs,' Advanced in Cryptology-Crypto'95, pp.222-235, 1995
- Business Scenarios Committee of the Key Recovery Alliance, 'Business Requirements for Key Recovery Release 3.0,' A vailable at http://www.kra.org./whitepapers, 1997
- H. Abelson, R. Anderson, S. M. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P. G. Neumann, R. L. Rivest, J. I. Schiller and B. Schneier, 'The Risk of Key Recovery, Key Escrow and Trusted Third Party Encryption,' available at http://www.cdt.org/crypto/risks98, 1998
- Yang-Chen Lee and Chi-Sung Laih, 'On the Key Recovery of the Key Escrow System,' Proceedings of 13th Annual Conference on Computer Security Applications, pp.216-220, 1997 https://doi.org/10.1109/CSAC.1997.646192
- Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, 'Handbook of Applied Cryptography,' pp.321-331, CRC Press, 1996
- Colin Boyd, 'Enforcing Traceability in Software,' 1st International Conference on Information and Communication Security, ICICS'97, pp.398-408, 1997 https://doi.org/10.1007/BFb0028495
- S. C. Pohig and M. E. Hellman, 'An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance,' IEEE Transaction on Information Theory, Vol. IT 24, No.1, pp.103-110, 1978
- W. Diffie and M. E. Hellman, 'New Directions in Cryptography,' IEEE Transaction on Information Theory, Vol.IT 22, No.6, pp.135-145, 1976 https://doi.org/10.1109/TIT.1976.1055638