Riferimenti e Note Bibliografiche
[1] M.Tatafiore, G.Cordasco. Data Encryption standard. Tesina per il corso di SICUREZZA SU RETI, corso di laurea in Informatica, Università di Salerno.
[2] M. Smith, P. VanOorschot & M. Willett, Cryptographic Information Recovery Using Key Recovery, Computers & Security, 19 (2000) 21-27
[3] Giuseppe Bortone, Francesco Miola, Roberta Mazza, "SET - Secure Electronic Transaction". Tesina per il corso di SICUREZZA SU RETI, corso di laurea in Informatica, Università di Salerno.
[4] Dorothy E. Denning, "A Taxonomy for Key Escrow Encryption System", Università di Georgetown.
Versione locale :<Taxonomy.htm>
[5] Dorothy E. Denning and Miles Smid, "Key Escrowing Today", IEEE Communications, Vol. 32, No. 9, Sept. 1994, pp. 58-68.
Versione
locale :<Key-Escrowing-Today.txt>
[6] SKIPJACK and KEA Algorithm Specifications, Version 2.0, 29 Maggio 1998
Versione locale : <skipjack.pdf>
[7] National Institute for Standards and Technology, "Escrowed Encryption Standard (EES)," Federal Information Processing Standards Publication (FIPS PUB) 185, 1994.
[8] David P. Maher, "Crypto Backup and Key Escrow," Comm. ACM, Mar. 1996.
[9]
Frank
W. Sudia, "Private Key Escrow System," overheads of presentation,
Bankers Trust Co., New York, NY, 1995.
[10]
SecureKEES
product literature, CertCo, Bankers Trust Company
[11]
versione locale: <vpke.ps>
[12] Mihir Bellare and Shafi Goldwasser. " Verifiable Cryptographic Time Capsules: A New Approach to Key Escrow," Manuscript, April 1996.
[13]
[14] Matt Blaze, "Key Management in an Encrypting File System."
Versione locale : <cfskey.ps>
[15] Jim Omura, "Alternatives to RSA Using Diffie-Hellman with DSS," White Paper, Cylink, Sept. 1995.
Versione locale :<Alternatives to RSA Using Diffie-Hellman with DSS.htm>
[16]
[17]
Thomas Beth, Hans-Joachim
Knobloch, Marcus Otten, Gustavus J. Simmons, and Peer
Wichmann, "Clipper Repair Kit - Towards Acceptable Key Escrow Systems,"
Proc. 2nd ACM
Conf. on Communication and Computer
Security, 1994.
[18]
Carmi
Gressel, Ran Granot, and Itai Dror, "International Cryptographic
Communication without Key Escrow. KISS:
Keep the Invaders (of Privacy) Socially Sane," International Cryptography
Institute 1995: Global Challenges; Fortress
U & T Ltd., POB 844, Beer Sheva 84106, Israel,
1994.
[19]
Otto Leiberich, private communication, June 1994.
[20]
Tom Leighton and Silvio Micali, "Secret-Key Agreement without Public-Key
Cryptography,"
Proc. Crypto '93, pp. 208-221.
[21]
Arjen
K. Lenstra, Peter Winkler, and Yacov Yacobi, "A Key Escrow System with
Warrant Bounds," Proc. Crypto '95,
pp. 197-207.
Versione locale: <escrow.ps>
[22]
Lotus
Backgrounder, "Differential Workfactor Cryptography," Lotus
Development Corp.; distributed at RSA Data Security Conference, Jan. 17, 1996.
[23]
Silvio Micali, "Fair Cryptosystems," MIT/LCS/TR-579.c,
Laboratory for Computer Science,
Massachusetts Institute of
Technology, Cambridge, MA, August 1994.
[24]
Silvio
Micali, "Guaranteed Partial Key-Escrow," MIT/LCS/TM-537,
Laboratory for Computer Science, Massachusetts Institute of Technology,
Cambridge, MA, 1995.
[25]
Silvio
Micali and Ray Sidney,"A Simple Method for Generating and Sharing Pseudo-Random Functions,
with Applications to Clipper-Like Key Escrow Systems,"
Crypto '95, pp. 185-196.
[26]
James Nechvatal, "A Public-Key Based Key Escrow System," J.
of Systems and Software, to appear Oct. 1996.
[27]
Warwick Ford, "Entrust
Technical Overview," White Paper, Nortel Secure Networks, Oct. 1994.
[28]
Stoplock
Press, PC Security, Ltd.,
Marlow, Buckinghamshire, UK, Issue 3, Nov. 1995.
[29]
Nigel
Jefferies, Chris Mitchell, and Michael Walker, "A Proposed Architecture
for Trusted Third Party Services,"
Royal Holloway, University of London, 1995.
[30]
Ben
Laurie, "A Supplementary Analysis of the Royal Holloway TTP-based Key
Escrow Scheme", A.L. Group, 16 Nov 1996.
Versione locale :<Supplementary.htm>
[31]
RSA Secure^TM, product literature from RSA Data Security, Inc.
[32] Adi
Shamir, "Partial Key Escrow: A New Approach to Software Key
Escrow",
The Weizmann Institute,
presentation at NIST Key Escrow Standards meeting, Sept. 15, 1995.
[33]
[34]
Thomas
Beth, Fritz Bauspieß, Hans-Joachim Knobloch, and Steffen Stempel, "TESS:
A security system
based on discrete exponentiation," Computer Communications, Vol. 17, No. 7, July, 1994, pp. 466-475.
[35]
Thomas
Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, and Peer
Wichmann,
"Towards
Acceptable Key Escrow Systems," Proc.
2nd ACM Conf. on Communication and Computer Security, 1994, pp. 51-58
[36]
[37]
Stephen T. Walker, Stephen B.
Lipner, Carl M. Ellison, and David M. Balenson, "Commercial
Key Recovery," Comm.
ACM, Mar. 1996.
[38]