57
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

Public key cryptosystems based on boolean permutations and their applications

&
Pages 167-184 | Received 17 Jun 1999, Accepted 16 Jul 1999, Published online: 19 Mar 2007

References

  • Adams , C.M. and Tavares , S. 1990 . The structured design of cryptographically good S-boxes . Journal of Cryptology , 3 : 27 – 41 .
  • Bellare , M. and Goldwasser , S. Verifiable partial key escrow . Proceedings of the Fourth ACM Conference on Computer and Communications Security, ACM . April . Also available at [http://ww-cse.ucsd.edu/users/mihir/papers/crypto-papers.html]
  • Caelli , W. Cryptography:Policy and Algorithms . Proceedings, Lecture Notes in Computer Science 1029 . pp. 40 – 64 . Springer-Verlag .
  • Denning , D. and Smid , M. 1994 . Key escrow today . IEEE Communications Magazine , 32 : 58 – 68 .
  • Denning , D. and Branstad , D. 1996 . A Taxonomy of Key Escrow Encryption . Communications of the ACM , 39 : 34 – 40 .
  • Desmedt , Y. 1993 . “ Threshold cryptosystems ” . In Advances in Cryptology - Auscrypt'92 , 3 – 14 . Springer-Verlag . Lecture Notes in Computer Science 718
  • Desmedt , Y. 1995 . “ Securing traceability of ciphertexts: towards a secure software key escrow system ” . In Advances in Cryptology-Eurocrypt'95 , 147 – 157 . Springer-Verlag . Lecture Notes in Computer Science 921
  • Diffie , W. and Hellman , M. 1976 . New directions in cryptology . IEEE Trans, on Information Theory , U-22 : 644 – 655 .
  • Frankel , Y. and Yung , M. 1995 . “ Escrow encryption systems visited: attacks, analysis and design ” . In Advances in Cryptology - Crypto'95 , 222 – 235 . Springer-Verlag . Lecture Notes in Computer Science 963
  • Ganesan , R. 1996 . How to use key escrow . Communications of the ACM , 39 ( 33 )
  • Garey , M.R. and Johnson , D.S. 1978 . Computers and Intractability: A guide to the Theory of NP-Completeness , Edited by: Freeman , W.H. New York : Bell Telephone Laboratories Incorporated .
  • He , J. and Dawson , E. 1996 . A New Key Escrow Cryptosystem, Cryptography: Policy and Algorithms , 105 – 114 . Springer-Verlag .
  • Karpovsky , M.G. 1976 . Finite Orthogonal Series in the Design of Digital Devices , New York : John Wiley & Sons .
  • Mac Williams , F.J. and Sloane , N.J.A. 1977 . The Theory of Error-Correcting Codes , North-Holland .
  • Maher , D.P. 1996 . Crypto backup and key escrow . Communications of the ACM , 39 : 48 – 53 .
  • Mceliece , R.L. 1978 . A public-key cryptosystem based on algebraic coding theory , Vol. 42-44 , 114 – 116 . Pasadena : Jet Propulsion Labs . Deep Space Network Progress Report
  • Micali , S. and Sidney , R. 1995 . “ A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like key Escrow Systems ” . In Advances in Cryptology - Crypto'95 , 185 – 196 . Springer-Verlag . Lecture Notes in Computer Science 963
  • National Institute for Standards and Technology . Feb 1994 . Escrowed Encryption Standard (EES) , Vol. 185 , Feb , Federal Information Processing Standards Publication. . FIPS PUB
  • Nyberg , K. 1991 . “ Perfect nonlinear S-boxes ” . In Advances in Cryptology, Proc. Eurocrypt'91 , 378 – 386 . Springer-Verlag .
  • Pieprzyk , J. and Finkelstein , G. 1988 . Towards effective nonlinear cryptosystem design . IEE Proceedings, Part E , 135 : 325 – 335 .
  • Shamir , A. , Rivest , R.L. and Adleman , L. 1978 . A method for obtaining digital signatures . Communications of the ACM , 21 : 120 – 126 .
  • Shamir , A. Partial key escrow: A new approach to software key escrow . Presented at Key Escrow Conference . September , Washington. D.C.
  • Walker , S. , Lipner , S. , Ellison , C. and Balenson , D. 1996 . Commercial key recovery . Communications of the ACM , 39 : 41 – 47 .
  • Wu , C.K. 1993 . Boolean functions in cryptology , Xidian University . Ph.D. Thesis

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.