A Proposed Federal Information Processing Standard for an Escrowed Encryption Standard (EES), Federal Register, 1993, July, 30.[2]Dawson E, He J. Another aproach to software key escrow encryption. Information Security and Privacy, LNCS1172, Berlin: Springer-Verlag, 1996, 87-95.[3]Desmedt Y. Securing tracablity of ciphertexts-towards a secure software key escrow system.[4]Advances in Cryptology-EUROCRYPT95, LNCS921, Berlin: Springer-Verlag, 1995, 147-157.[5]He J, Dawson E. A New Key Escrow Cryptosystem. In Cryptography: Policy and Algorithms. LNCS 1029, Berlin: Springer-Verlag, 1995, 105-114.[6]Micali S. Fair public-key cryptosystems. Advances in Cryptology- CRYPTO92, LNCS740, Berlin: Springer-Verlag, 1992, 113-138.[7]Kiliam J.[J].Leighton T. Fair cryptosystems, revisited. Advances in CRYPTO95, LNCS963, Berlin: Springer-Verlag.1995,:-Stinson D R. Cryptography-Theory and Practice. London: CRC Press, Inc., 1995, 162-164.[8]Simmons G J. Contemporary cryptology. New York: IEEE Press, Inc., 1992, 441-497.
|