Search
Patexia Contest

CONTEST

Competed

Patent Known References

TypePatent CountryPatent Number
Patent US 4200770
Patent US 4218582
Patent US 4405829
Patent US 4424414
Patent US 4625076
Patent US 4641346
Patent US 4748668
Patent US 4881264
Patent US 4933970
Patent US 4995082
Patent US 5005200
Patent US 5097504
Patent US 5231668
Patent US 5276737
Patent US 5315658
Patent US 5557346
Patent US 5557765
Patent US 5633928
Patent US 5640454
Patent US 5647000
Patent US 5796830
Patent US 5805712
Patent US 5815573
Patent US 5872849
Patent US 5917912
Patent US 5937066

Published Known References

TypeTitle of NPL
Journal Digital Systems CRC Handbook of Applied Cryptography Ch 11 pp. 425-444.
Journal Digital Systems CRC Handbook of Applied Cryptography Ch 11 pp. 445-464.
Journal Digital Systems CRC Handbook of Applied Crytography Ch 11 pp. 465-481.
Journal "A Fiat A. Shamir ""How to Prove Yourself: Practical Solutions to Identification and Signature Problems"" CRYPTO '86 pp. 186-194 Springer-Verlag 1987."
Journal "A. De Santis Y. Desmedt Y. Frankel M. Yung ""How to Share a Function Securrely"" ACM STOC '94 pp. 522-533 1994."
Journal "A. Lenstra P. Winkler Y. Yacobi ""A Key Escrow System with Warrant Bounds"" CRYPTO '95 pp. 197-207 Springer-Verlag 1995."
Journal "A. Young M. Yung ""Kleptography: Using Cryptography Against Cryptography"" Eurocrypt '97 pp. 62-74 Springer-Verlag 1997."
Journal "D. Chaum ""Blind Signatures For Untraceable Payments""."
Journal "D. Chaum T.P. Pedersen ""Wallet Databases with Observers""."
Journal "D. Denning D. Branstad ""A Taxonomy for Key Escrow Encryption Systems"" Communications of the ACM v. 39 n. 3 1996."
Journal "E. Verheul H. Tilborg ""Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals"" Eurocrypt '97 pp. 119-133 Springer-Verlag 1997."
Journal IBM SecureWay key recovery technology document available at http://www.ibm.com/Security/html/wp-keyrec.html(downloaded May 25 1997).
Journal "J. Kilian F. Leighton ""Fair Cryptosystems Revisited"" CRYPTO '95 pp. 208-221 Springer-Verlag 1995."
Journal "K. Nyberg R. Rueppel ""Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem""."
Journal "L. Lacy D. Mitchell W. Schell ""CryptoLib: Cryptography in Software"" AT&T Bell Labs Crypto@research.att.com."
Journal "M. Bellare P. Rogaway ""Optimal Asymmetric Encryption"" Eurocrypt '94 pp. 92-111 Springer-Verlag 1994."
Journal "N. Jefferies C. Mitchell M. Walker ""A Proposed Architecture for Trusted Third Party Services"" Cryptography: Policy and Algorithms LNCS 1029 Springer 1996."
Journal "P. Feldman ""A Practical Scheme for Non-interactive Verifiable Secret Sharing"" 28th annual FOCS pp. 427-437 1987."
Journal "R. Anderson M. Roe ""The GCHQ Protocol and Its Problems"" Eurocrypt '97 pp. 134-148 Springer-Veriag 1997."
Journal "R. Ganesan ""How To Use Key Escrow"" Communications of the ACM v. 39 n.3 p. 33 1996."
Journal "S. Goldwasser S. Micali R. Rivest ""A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks"" SIAM Journal on Computing vol. 17 n. 2 1988."
Journal "S. Micali ""Fair Public-Key Cryptosystems"" CRYPTO '92 pp. 113-138 Springer-Verlag 1992."
Journal "S. Walker J. Winston ""Principles for Use of Encryption and Key Recovery"" available at http://www.tis.com/docs/products/recoverkey/recoverkey.html(downloaded May 25 1997)."
Journal Schneier Applied Cryptography 1995.
Journal Schneier Applied Cryptography section 24.9 pp. 574-576 1996.
Journal "T. ElGamal ""A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms"" CRYPTO '84 pp. 10-18 Springer-Verlag 1985."
Journal "T.P. Pedersen ""A Threshold Cryptosystem without a Trusted Party""."
Journal "W. Diffie M. Hellman ""New Directions in Cryptography"" IEEE Transactions on Information Theory 22 pp. 644-654 1976."
Journal "Y. Desmedt ""Securing Traceability of Ciphertexts-Towards a Secure Software Key Escrow System"" Eurocrypt '95 pp. 147-157 Springer-Verlag 1995."
Journal "Y. Desmedt ""Securing Traceability of Ciphertexts—Towards a Secure Software Key Escrow System"" Eurocrypt '95 pp. 147-157 Springer-Verlag 1995."
Journal "Y. Desmedt Y. Frankel ""Threshold cryptosystems"" CRYPTO '89 pp. 307-315 Springer-Verlag 1989."
Journal "Y. Frankel M. Yung ""Escrow Encryption Systems Visited: Attacks Analysis and Designs"" CRYPTO '95 Springer-Verlag 1995."
Menu