Number | Name | Date | Kind |
---|---|---|---|
4218738 | Matyas et al. | Aug 1980 | A |
5347580 | Molva et al. | Sep 1994 | A |
Entry |
---|
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition; Subchapter 4.14 “Key Escrow”—pp. 97-100; Bruce Schneier; Published: Oct. 1995. |