Escrow Encryption Systems Visited: Attacks, Analysis and Designs
- 1 January 1995
- book chapter
- Published by Springer Nature
- p. 222-235
- https://doi.org/10.1007/3-540-44750-4_18
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Threshold cryptosystemsPublished by Springer Nature ,2001
- Building in Big BrotherPublished by Springer Nature ,1995
- Protocol failure in the escrowed encryption standardPublished by Association for Computing Machinery (ACM) ,1994
- Towards acceptable key escrow systemsPublished by Association for Computing Machinery (ACM) ,1994
- Why cryptosystems failPublished by Association for Computing Machinery (ACM) ,1993
- Key processing with control vectorsJournal of Cryptology, 1991
- Public-key cryptosystems provably secure against chosen ciphertext attacksPublished by Association for Computing Machinery (ACM) ,1990
- On the covering radius of binary, linear codes meeting the Griesmer boundIEEE Transactions on Information Theory, 1985
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976