References
- Adams , C.M. and Tavares , S. 1990 . The structured design of cryptographically good S-boxes . Journal of Cryptology , 3 : 27 – 41 .
- Bellare , M. and Goldwasser , S. Verifiable partial key escrow . Proceedings of the Fourth ACM Conference on Computer and Communications Security, ACM . April . Also available at [http://ww-cse.ucsd.edu/users/mihir/papers/crypto-papers.html]
- Caelli , W. Cryptography:Policy and Algorithms . Proceedings, Lecture Notes in Computer Science 1029 . pp. 40 – 64 . Springer-Verlag .
- Denning , D. and Smid , M. 1994 . Key escrow today . IEEE Communications Magazine , 32 : 58 – 68 .
- Denning , D. and Branstad , D. 1996 . A Taxonomy of Key Escrow Encryption . Communications of the ACM , 39 : 34 – 40 .
- Desmedt , Y. 1993 . “ Threshold cryptosystems ” . In Advances in Cryptology - Auscrypt'92 , 3 – 14 . Springer-Verlag . Lecture Notes in Computer Science 718
- Desmedt , Y. 1995 . “ Securing traceability of ciphertexts: towards a secure software key escrow system ” . In Advances in Cryptology-Eurocrypt'95 , 147 – 157 . Springer-Verlag . Lecture Notes in Computer Science 921
- Diffie , W. and Hellman , M. 1976 . New directions in cryptology . IEEE Trans, on Information Theory , U-22 : 644 – 655 .
- Frankel , Y. and Yung , M. 1995 . “ Escrow encryption systems visited: attacks, analysis and design ” . In Advances in Cryptology - Crypto'95 , 222 – 235 . Springer-Verlag . Lecture Notes in Computer Science 963
- Ganesan , R. 1996 . How to use key escrow . Communications of the ACM , 39 ( 33 )
- Garey , M.R. and Johnson , D.S. 1978 . Computers and Intractability: A guide to the Theory of NP-Completeness , Edited by: Freeman , W.H. New York : Bell Telephone Laboratories Incorporated .
- He , J. and Dawson , E. 1996 . A New Key Escrow Cryptosystem, Cryptography: Policy and Algorithms , 105 – 114 . Springer-Verlag .
- Karpovsky , M.G. 1976 . Finite Orthogonal Series in the Design of Digital Devices , New York : John Wiley & Sons .
- Mac Williams , F.J. and Sloane , N.J.A. 1977 . The Theory of Error-Correcting Codes , North-Holland .
- Maher , D.P. 1996 . Crypto backup and key escrow . Communications of the ACM , 39 : 48 – 53 .
- Mceliece , R.L. 1978 . A public-key cryptosystem based on algebraic coding theory , Vol. 42-44 , 114 – 116 . Pasadena : Jet Propulsion Labs . Deep Space Network Progress Report
- Micali , S. and Sidney , R. 1995 . “ A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like key Escrow Systems ” . In Advances in Cryptology - Crypto'95 , 185 – 196 . Springer-Verlag . Lecture Notes in Computer Science 963
- National Institute for Standards and Technology . Feb 1994 . Escrowed Encryption Standard (EES) , Vol. 185 , Feb , Federal Information Processing Standards Publication. . FIPS PUB
- Nyberg , K. 1991 . “ Perfect nonlinear S-boxes ” . In Advances in Cryptology, Proc. Eurocrypt'91 , 378 – 386 . Springer-Verlag .
- Pieprzyk , J. and Finkelstein , G. 1988 . Towards effective nonlinear cryptosystem design . IEE Proceedings, Part E , 135 : 325 – 335 .
- Shamir , A. , Rivest , R.L. and Adleman , L. 1978 . A method for obtaining digital signatures . Communications of the ACM , 21 : 120 – 126 .
- Shamir , A. Partial key escrow: A new approach to software key escrow . Presented at Key Escrow Conference . September , Washington. D.C.
- Walker , S. , Lipner , S. , Ellison , C. and Balenson , D. 1996 . Commercial key recovery . Communications of the ACM , 39 : 41 – 47 .
- Wu , C.K. 1993 . Boolean functions in cryptology , Xidian University . Ph.D. Thesis