“A Taxonomy For Key Escrow Encryption Systems” by D. E. Denning and D. K. Branstad, Communications of the ACM—Mar. 1996/vol. 30, No. 3, pp. 34-40. |
“Public Key Infrastructure—Binding Cryptography—A Fraud-Detectible Alternative To Key-Escrow Proposals” by E. Verheul et al, Computer Law & Security Report, vol. 13, No. 1, 1997, pp. 3-14. |
Federal Information Processing Standards Publication 46-2, Dec. 30, 1993, Announcing the Standard for “Data Encryption Standard (DES)”, http://www.itl.nist.gov/div897/pubs/fip46-2.htm. |
Federal Information Processing Standards Publication 81, Dec. 2, 1980, Announcing the Standard for “DES Modes of Operation”, http://www.itl.nist.gov/div897/pubs/fip81.htm. |