Skip to search formSkip to main contentSkip to account menu

Key escrow

Known as: Escrowed encryption, Fair cryptosystem, Key recovery 
Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Several recent standards, including NIST SP 80056A and RFC 5114, advocate the use of “DSA” parameters for Diffie-Hellman key… 
2015
2015
Design of SP networks in which the non-linear layer is applied to only a part of the state in each round was suggested by Gerard… 
2013
2013
In 2011, Li presented clockwise collision analysis on nonprotected Advanced Encryption Standard (AES) hardware implementation. In… 
2012
2012
To combat crime and terrorist organizations, government expects to monitor the suspicious communication but the leak of personal… 
2011
2011
Recently, several identity (ID)-based authenticated group key exchange (IDAGKE) protocols from bilinear pairings were proposed… 
2011
2011
IDEA is a 64-bit block cipher with 128-bit keys which is widely used due to its inclusion in several cryptographic packages such… 
2010
2010
In this paper, we propose a routing scheme, called MOSAR, which is able to handle the security classification of packets during… 
Highly Cited
2008
Highly Cited
2008
A recent framework for chosen IV statistical distinguishing analysis of stream ciphers is exploited and formalized to provide new… 
1996
1996
In this paper we present a key escrow system which meets possible requirements for international key escrow, where different… 
1994
1994
This paper describes a method for escrowing cryptographic keys, which w e call Failsafe Key Escrow FKE. The method is…