CONTEST
CompetedPrize
$3,500
$3,500
DEADLINE
This contest is closed.
This contest is closed.
Patent Known References
Type | Patent Country | Patent Number |
---|---|---|
Patent | US | 4200770 |
Patent | US | 4218582 |
Patent | US | 4405829 |
Patent | US | 4424414 |
Patent | US | 4625076 |
Patent | US | 4641346 |
Patent | US | 4748668 |
Patent | US | 4881264 |
Patent | US | 4933970 |
Patent | US | 4995082 |
Patent | US | 5005200 |
Patent | US | 5097504 |
Patent | US | 5231668 |
Patent | US | 5276737 |
Patent | US | 5315658 |
Patent | US | 5557346 |
Patent | US | 5557765 |
Patent | US | 5633928 |
Patent | US | 5640454 |
Patent | US | 5647000 |
Patent | US | 5796830 |
Patent | US | 5805712 |
Patent | US | 5815573 |
Patent | US | 5872849 |
Patent | US | 5917912 |
Patent | US | 5937066 |
Published Known References
Type | Title of NPL |
---|---|
Journal | Digital Systems CRC Handbook of Applied Cryptography Ch 11 pp. 425-444. |
Journal | Digital Systems CRC Handbook of Applied Cryptography Ch 11 pp. 445-464. |
Journal | Digital Systems CRC Handbook of Applied Crytography Ch 11 pp. 465-481. |
Journal | "A Fiat A. Shamir ""How to Prove Yourself: Practical Solutions to Identification and Signature Problems"" CRYPTO '86 pp. 186-194 Springer-Verlag 1987." |
Journal | "A. De Santis Y. Desmedt Y. Frankel M. Yung ""How to Share a Function Securrely"" ACM STOC '94 pp. 522-533 1994." |
Journal | "A. Lenstra P. Winkler Y. Yacobi ""A Key Escrow System with Warrant Bounds"" CRYPTO '95 pp. 197-207 Springer-Verlag 1995." |
Journal | "A. Young M. Yung ""Kleptography: Using Cryptography Against Cryptography"" Eurocrypt '97 pp. 62-74 Springer-Verlag 1997." |
Journal | "D. Chaum ""Blind Signatures For Untraceable Payments""." |
Journal | "D. Chaum T.P. Pedersen ""Wallet Databases with Observers""." |
Journal | "D. Denning D. Branstad ""A Taxonomy for Key Escrow Encryption Systems"" Communications of the ACM v. 39 n. 3 1996." |
Journal | "E. Verheul H. Tilborg ""Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals"" Eurocrypt '97 pp. 119-133 Springer-Verlag 1997." |
Journal | IBM SecureWay key recovery technology document available at http://www.ibm.com/Security/html/wp-keyrec.html(downloaded May 25 1997). |
Journal | "J. Kilian F. Leighton ""Fair Cryptosystems Revisited"" CRYPTO '95 pp. 208-221 Springer-Verlag 1995." |
Journal | "K. Nyberg R. Rueppel ""Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem""." |
Journal | "L. Lacy D. Mitchell W. Schell ""CryptoLib: Cryptography in Software"" AT&T Bell Labs Crypto@research.att.com." |
Journal | "M. Bellare P. Rogaway ""Optimal Asymmetric Encryption"" Eurocrypt '94 pp. 92-111 Springer-Verlag 1994." |
Journal | "N. Jefferies C. Mitchell M. Walker ""A Proposed Architecture for Trusted Third Party Services"" Cryptography: Policy and Algorithms LNCS 1029 Springer 1996." |
Journal | "P. Feldman ""A Practical Scheme for Non-interactive Verifiable Secret Sharing"" 28th annual FOCS pp. 427-437 1987." |
Journal | "R. Anderson M. Roe ""The GCHQ Protocol and Its Problems"" Eurocrypt '97 pp. 134-148 Springer-Veriag 1997." |
Journal | "R. Ganesan ""How To Use Key Escrow"" Communications of the ACM v. 39 n.3 p. 33 1996." |
Journal | "S. Goldwasser S. Micali R. Rivest ""A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks"" SIAM Journal on Computing vol. 17 n. 2 1988." |
Journal | "S. Micali ""Fair Public-Key Cryptosystems"" CRYPTO '92 pp. 113-138 Springer-Verlag 1992." |
Journal | "S. Walker J. Winston ""Principles for Use of Encryption and Key Recovery"" available at http://www.tis.com/docs/products/recoverkey/recoverkey.html(downloaded May 25 1997)." |
Journal | Schneier Applied Cryptography 1995. |
Journal | Schneier Applied Cryptography section 24.9 pp. 574-576 1996. |
Journal | "T. ElGamal ""A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms"" CRYPTO '84 pp. 10-18 Springer-Verlag 1985." |
Journal | "T.P. Pedersen ""A Threshold Cryptosystem without a Trusted Party""." |
Journal | "W. Diffie M. Hellman ""New Directions in Cryptography"" IEEE Transactions on Information Theory 22 pp. 644-654 1976." |
Journal | "Y. Desmedt ""Securing Traceability of Ciphertexts-Towards a Secure Software Key Escrow System"" Eurocrypt '95 pp. 147-157 Springer-Verlag 1995." |
Journal | "Y. Desmedt ""Securing Traceability of Ciphertexts—Towards a Secure Software Key Escrow System"" Eurocrypt '95 pp. 147-157 Springer-Verlag 1995." |
Journal | "Y. Desmedt Y. Frankel ""Threshold cryptosystems"" CRYPTO '89 pp. 307-315 Springer-Verlag 1989." |
Journal | "Y. Frankel M. Yung ""Escrow Encryption Systems Visited: Attacks Analysis and Designs"" CRYPTO '95 Springer-Verlag 1995." |