"A Taxonomy for Key Escrow Encryption System", D. E. Denning et al., Communications of the ACM, vol. 39, No. 3, Mar. 1996, pp. 34-40. |
Applied Cryptography, Second Edition, Bruce Schneier, John Wiley & Sons, Inc., New York, 1996, pp. 70-71. |
"Cryptography: A New Dimension In Computer Data Security", Meyer et al., John Wiley & Sons, NY, pp. 294-299, 368-371, 502-507, 558-569. |
"Crptography and Data Security" D. Denning, Purdue University, Addison-Wesley Publishing Co., 1982, pp. 179-185, 228-230. |
"Cryptography Sealing for Information Secrecy and Authentication", D. Gifford, Comm. of the ACM, vol. 25, No. 4 pp. 274-286. |
"Fair Public-Key Cryptosystems" S. Micali, Laboratory for Computer Science, Massachusets Institute of Technology, Mar. 93, pp. 1-11. |
"MIT/1cs/tr-579 Fair Public-Key Cryptosystems" S. Micali, Lab. for Computer Seience, Mass. Institute of Technology, Sep. 93, pp. 1-33. |
"On Secret Sharing Systems", E. Krasniansky et al., Proceedings 1981 IEEE International Symposium on Info. Theory, CA, Feb. 81, pp. 47-48. |
"Public Key Cryptography . . . Using Diffie-Hellman", Working Draft: X9.42, Oct. 26, 1995, American National Standard. |
"Secure Hash Standard", US Dept. of Commerce, R. Brown, Secretary, Federal Information Processing Standards Pub., Dec. 1994, pp. 1-21. |
"Untraceable Electronic Mail, Return Addresses, & Digital Pseudonyms" D.L. Chaum, Comm of the ACM, Feb. 81, vol. 24, No. 2, pp. 84-88. |