Riferimenti e Note Bibliografiche

 

[1] M.Tatafiore, G.Cordasco.  Data Encryption standard. Tesina per il corso di SICUREZZA SU   RETI, corso di laurea in Informatica, Università di Salerno.

[2] M. Smith, P. VanOorschot & M. Willett, Cryptographic Information Recovery Using Key Recovery, Computers & Security, 19 (2000) 21-27

[3]  Giuseppe Bortone, Francesco Miola, Roberta Mazza, "SET - Secure Electronic Transaction". Tesina per il corso di SICUREZZA SU   RETI, corso di laurea in Informatica, Università di Salerno.

[4] Dorothy E. Denning, "A Taxonomy for Key Escrow Encryption System", Università di Georgetown. 

[5] Dorothy E. Denning and Miles Smid,  "Key Escrowing Today", IEEE Communications, Vol. 32, No. 9, Sept. 1994, pp. 58-68.

[6] SKIPJACK and KEA Algorithm Specifications, Version 2.0, 29 Maggio 1998 

[7] National Institute for Standards and Technology, "Escrowed Encryption Standard (EES)," Federal Information Processing Standards Publication (FIPS PUB) 185, 1994.

[8] David P. Maher, "Crypto Backup and Key Escrow," Comm. ACM, Mar. 1996.

[9] Frank W. Sudia, "Private Key Escrow System," overheads of presentation, Bankers Trust Co.,       New York, NY, 1995.  

[10] SecureKEES product literature, CertCo, Bankers Trust Company

[11] Mihir Bellare and Shafi Goldwasser. " Verifiable Partial Key Escrow," UCSD CSE Dept Technical Report CS95-447

[12] Mihir Bellare and Shafi Goldwasser. " Verifiable Cryptographic Time Capsules: A New Approach to Key Escrow," Manuscript, April 1996.

[13] Ravi Ganesan, "The Yaksha Security System," Comm. ACM, Mar. 1996.

[14] Matt Blaze, "Key Management in an Encrypting File System."

[15] Jim Omura, "Alternatives to RSA Using Diffie-Hellman with DSS," White Paper, Cylink, Sept.        1995.

[16]  Yvo Desmedt, "Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow  System," Proc. Eurocrypt '95, Saint-Malo, France, May 21-25, 1995, pp. 147-157.

[17] Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, and Peer              Wichmann, "Clipper Repair Kit - Towards Acceptable Key Escrow Systems," Proc. 2nd ACM         Conf. on Communication and Computer Security, 1994.

[18] Carmi Gressel, Ran Granot, and Itai Dror, "International Cryptographic Communication without  Key Escrow. KISS: Keep the Invaders (of Privacy) Socially Sane," International Cryptography        Institute 1995: Global Challenges; Fortress U & T Ltd., POB 844, Beer Sheva 84106, Israel,         1994.

[19] Otto Leiberich, private communication, June 1994.

[20] Tom Leighton and Silvio Micali, "Secret-Key Agreement without Public-Key Cryptography,"        Proc. Crypto '93, pp. 208-221.

[21] Arjen K. Lenstra, Peter Winkler, and Yacov Yacobi, "A Key Escrow System with Warrant Bounds," Proc. Crypto '95, pp. 197-207.  

[22] Lotus Backgrounder, "Differential Workfactor Cryptography," Lotus Development Corp.; distributed at RSA Data Security Conference, Jan. 17, 1996.

[23] Silvio Micali, "Fair Cryptosystems," MIT/LCS/TR-579.c, Laboratory for Computer Science,      Massachusetts Institute of Technology, Cambridge, MA, August 1994.

[24] Silvio Micali, "Guaranteed Partial Key-Escrow," MIT/LCS/TM-537, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA, 1995.

[25] Silvio Micali and Ray Sidney,"A Simple Method for Generating and Sharing Pseudo-Random  Functions, with Applications to Clipper-Like Key Escrow Systems," Crypto '95, pp. 185-196.

[26] James Nechvatal, "A Public-Key Based Key Escrow System," J. of Systems and Software, to    appear Oct. 1996.

[27] Warwick Ford, "Entrust Technical Overview," White Paper, Nortel Secure Networks, Oct. 1994.

[28] Stoplock Press, PC Security, Ltd., Marlow, Buckinghamshire, UK, Issue 3, Nov. 1995.

[29] Nigel Jefferies, Chris Mitchell, and Michael Walker, "A Proposed Architecture for Trusted         Third Party Services," Royal Holloway, University of London, 1995.  

[30] Ben Laurie, "A Supplementary Analysis of the Royal Holloway TTP-based Key Escrow Scheme", A.L. Group, 16 Nov 1996.  

[31] RSA Secure^TM, product literature from RSA Data Security, Inc.

[32] Adi Shamir, "Partial Key Escrow: A New Approach to Software Key Escrow", The Weizmann Institute, presentation at NIST Key Escrow Standards meeting, Sept. 15, 1995.

[33] Thomas Beth, Hans-Joachim Knobloch, and Marcus Otten, "Verifiable Secret Sharing for Monotone Access Structures," Proc. 1st ACM Conf. on Communication and Computer Security, 1993.

[34] Thomas Beth, Fritz Bauspieß, Hans-Joachim Knobloch, and Steffen Stempel, "TESS: A security system based on discrete exponentiation," Computer Communications, Vol. 17, No. 7, July, 1994, pp. 466-475.  

[35] Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, and Peer Wichmann, "Towards Acceptable Key Escrow Systems," Proc. 2nd ACM Conf. on Communication and Computer Security, 1994, pp. 51-58

[36] Yvo Desmedt, Yair Frankel, and Moti Yung, "A Scientific Statement on the Clipper Chip Technology and Alternatives," 1993.

[37] Stephen T. Walker, Stephen B. Lipner, Carl M. Ellison, and David M. Balenson, "Commercial         Key Recovery," Comm. ACM, Mar. 1996.

[38] David M. Balenson, Carl M. Ellison, Steven B. Lipner, and Stephen T. Walker, "A New Approach to Software Key Escrow Encryption," Trusted Information Systems, 3060 Washington Rd., Glenwood, MD, draft of August 15, 1994.