{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:33:17Z","timestamp":1725485597004},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540423003"},{"type":"electronic","value":"9783540477198"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-47719-5_10","type":"book-chapter","created":{"date-parts":[[2007,6,2]],"date-time":"2007-06-02T05:15:16Z","timestamp":1180761316000},"page":"104-114","source":"Crossref","is-referenced-by-count":0,"title":["Practical Key Recovery Schemes"],"prefix":"10.1007","author":[{"given":"Sung-Ming","family":"Yen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,4]]},"reference":[{"key":"10_CR1","unstructured":"NIST, \u201cEscrowed Encryption Standard,\u201d Federal Information Processing Standards Publication (FIPS PUB) 185, 1994."},{"issue":"7","key":"10_CR2","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/0140-3664(94)90099-X","volume":"17","author":"D.E. Denning","year":"1994","unstructured":"D.E. Denning, \u201cThe US key escrow encryption technology,\u201d Computer Communication Magazine, vol. 17, no. 7, pp. 453\u2013457, July 1994.","journal-title":"Computer Communication Magazine"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"D.E. Denning and M. Smid, \u201cKey escrowing today,\u201d IEEE Communication Magazine, pp. 58\u201368, Sept. 1994.","DOI":"10.1109\/35.312844"},{"issue":"1","key":"10_CR4","first-page":"43","volume":"11","author":"D.E. Denning","year":"1995","unstructured":"D.E. Denning, \u201cKey Escrow Encryption-the third paradigm,\u201d Computer Security Journal, vol. 11, no. 1, pp. 43\u201352, 1995.","journal-title":"Computer Security Journal"},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/227234.227239","volume":"39","author":"D.E. Denning","year":"1996","unstructured":"D.E. Denning and D.K. Branstad, \u201cA taxonomy for key escrow encryption systems,\u201d Commun. ACM, vol. 39, no. 3, pp. 34\u201340, 1996.","journal-title":"Commun. ACM"},{"issue":"3","key":"10_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/227234.227241","volume":"39","author":"D.P. Maher","year":"1996","unstructured":"D.P. Maher, \u201cCrypto backup and key escrow,\u201d Commun. ACM, vol. 39, no. 3, pp. 48\u201353, 1996.","journal-title":"Commun. ACM"},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/227234.227240","volume":"39","author":"S.T. Walker","year":"1996","unstructured":"S.T. Walker, S.B. Lipner, C.M. Ellison, and D.M. Balenson, \u201cCommercial key recovery,\u201d Commun. ACM, vol. 39, no. 3, pp. 41\u201347, 1996.","journal-title":"Commun. ACM"},{"key":"10_CR8","unstructured":"S.T. Walker, S.B. Lipner, C.M. Ellison, D.K. Branstad, and D.M. Balenson, \u201cCommercial key escrow: Something for everyone, now and for the future,\u201d TISR #541, Trusted Information Systems, Apr. 16, 1995."},{"key":"10_CR9","unstructured":"E.H. Spafford, \u201cObserving reusable password choices,\u201d Purdue University Technical Report CSD-TR 92-049, 31 July 1992."},{"key":"10_CR10","unstructured":"E.H. Spafford, \u201cObservations on reusable password choices,\u201d In Proc. of the 3rd Security Symposium, Usenix, September 1992."},{"issue":"3","key":"10_CR11","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/0167-4048(92)90207-8","volume":"11","author":"E.H. Spafford","year":"1992","unstructured":"E.H. Spafford, \u201cOPUS: Preventing weak password choices,\u201d Computers & Security, vol. 11, no. 3, pp. 273\u2013278, 1992.","journal-title":"Computers & Security"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"R. Rivest, \u201cThe MD5 message digest algorithm,\u201d RFC 1321, Apr. 1992.","DOI":"10.17487\/rfc1321"},{"key":"10_CR13","unstructured":"FIPS 180-1, \u201cSecure Hash Standard,\u201d NIST, US Department of Commerce, Washington D.C., April 1995."},{"key":"10_CR14","series-title":"Lect Notes Comput Sci","first-page":"83","volume-title":"Advances in Cryptology-AUSCRYPT\u201992","author":"Y. Zheng","year":"1993","unstructured":"Y. Zheng and J. Pieprzyk and J. Seberry, \u201cHAVAL-a one-way hashing algorithm with variable length of output,\u201d Advances in Cryptology-AUSCRYPT\u201992, Lecture Notes in Computer Science, Vol. 718, Springer-Verlag, pp. 83\u2013104, 1993."},{"issue":"1","key":"10_CR15","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S.C. Pohlig","year":"1978","unstructured":"S.C. Pohlig and M.E. Hellman, \u201cAn improved algorithm for computing logarithms over GF(p) and its cryptographic significance,\u201d IEEE Trans. on Inform. Theory, vol. 24, no. 1, pp. 106\u2013110, January 1978.","journal-title":"IEEE Trans. on Inform. Theory"},{"issue":"4","key":"10_CR16","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms,\u201d IEEE Trans. on Inform. Theory, vol. 31, no. 4, pp. 469\u2013472, July 1985.","journal-title":"IEEE Trans. on Inform. Theory"},{"issue":"2","key":"10_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystem,\u201d Commun. of ACM, vol. 21, no. 2, pp. 120\u2013126, 1978.","journal-title":"Commun. of ACM"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47719-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T16:07:10Z","timestamp":1556467630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47719-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540423003","9783540477198"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-47719-5_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}