Computer Systems Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, “Escrowed Encrytion Standard (EES)”, Federal Information Processing Standards Publication, FIPS PUB 185, Feb. 9, 1994. |
Dorothy Denning, “The Clipper Chip: A Technical Summary”, Revised Apr. 21, 1993. |
Maher, David P., CryptoBackup and key escrow, Communication of the ACM, vol. 39, No. 3, Mar. 1996. |
L. Harn and H. Y. Lin, “Integration of user authentication and access control”, IEEE Proceedings-E, vol. 139, No. 2, pp. 139-143, Mar. 1992. |
Brickell et al., “Skipjack Review: Interim Report: The Skipjack Algorithm”, Georgetown University, Office of Public Affairs, pp. 1-6 Jul. 28, 1993. |
Maher, David P., “Trust in the new Information Age”, AT&T Technical Journal, Sep./Oct. 1994, vol. 73, No. 5, Security Technologies, pp. 9-16. |
“Fair Cryptosystems”, Micali, S., Aug. 11, 1993. |
“Draft Proposed Escrowed Encryption Standard”, Branstad et al., viewgraphs presented at Computer Security and Privacy Meeting, Mar. 1994. |
“Protocol Failure in the Escrowed Encryption Standard”, Blaze, M., presented on Internet, Jun. 3, 1994.,. |
Private Escrow Key Management Key Escrow Encryption Workshop, Scheidt et al., paper distributed Jun. 10, 1994. |
“A Solution for the International Community”, TECSEC, Key Escrow Encryption Workshop, viewgraphs distributed Jun. 10, 1994. |
“An Advanced Key Management System”, TECSEC, Key Escrow Encryption Workshop, paper distributed Jun. 10, 1994. |
“Key Escrowing Today”, Denning et al., IEEE Communications, Sep. 1994. |
“A Taxonomy for Key Escrow Encryption Systems”, Denning et al., draft distributed Sept. 24, 1994. |
“Key Escrow Encryption: Does it Protect or Compromise User Interest?”, Denning, D., Jan. 3, 1995. |
“Observations About Key Escrow Alternatives”, Denning, D., Jan. 2, 1995. |
Denning, Dorothy, “International Key Escrow Encryption: Proposed Objectives”, Georgetown Universitydraft of May 23, 1994. |
Eldridge, Alan, Lotus Notes, “Key Escrow for Lotus Notes”, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
Fischer, Addison, Fischer International, “Software Key Escrow -Corporate Implementation”, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
Novell, “Encryption Alternatives”, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
Computer Associates International, Inc., “Commerical Cryptography Perspectives”, comments submitted in key Escrow Alternatives Workshop, Jun. 10, 1994. |
Puhl, Larry, Motorola, comments submitted in Key Escrow Alternatives Workshop, Jun. 8, 1994. |
Ferguson, Bill, Semaphore, comments submitted in Key Escrow Alternatives Workshop, Jun. 8, 1994. |
COMPAQ Computer Corporation, “Proposed NIST Draft”, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994. |
Housley, Russell, SPYRUS, letter to Lynn McNulty, Aug. 3, 1994. |
Desmedt, Yvo et al., “A Scientific Statement on the Clipper Chip Technology and Alternatives”, University of Wisconsin, Milwaukee. |
Droge, John C., “International Key Escrow”, presented to NIPLI, Sep. 22, 1994. |
Ford et al., “A Key Distribution Method for Object-Based Protection”, presented at the Second ACM Conference on Computer and Communications Security, Nov. 2-4, 1994, Fairfax, Virginia, pp. 193-197. |
Zimmerman, P., “Phil's Pretty Good Software Presents PGP: Pretty Good Privacy Public Key Encryption for the Masses”, PGP User's Guide vol. I: Essential Topics, Dec. 3, 1992, pp. 1-40. |
Zimmerman, P., “Phil's Pretty Good Software Presents PGP: Pretty Good Privacy Public Key Encryption for the Masses”, PGP User's Guide vol. II: Special Topics, Dec. 3, 1992, pp. 1-53. |
Appendix A. Internal Data Structures Used by PGP 2.1, Dec. 3, 1992, pp. 1-18. |