{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:02:27Z","timestamp":1737435747141,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540629757"},{"type":"electronic","value":"9783540690535"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_11","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:24:05Z","timestamp":1186363445000},"page":"134-148","source":"Crossref","is-referenced-by-count":6,"title":["The GCHQ Protocol and Its Problems"],"prefix":"10.1007","author":[{"given":"Ross","family":"Anderson","sequence":"first","affiliation":[]},{"given":"Michael","family":"Roe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"RJ Anderson, \u201cWhy Cryptosystems Fail\u201d, in Communications of the ACM v 37 no 11 (Nov 94) pp 32\u201340","DOI":"10.1145\/188280.188291"},{"key":"11_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/3-540-48658-5_29","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 94","author":"M. Burmester","year":"1994","unstructured":"M Burmester, \u201cOn the Risk of Opening Distributed Keys\u201d, in Advances in Cryptology \u2014 CRYPTO\u2019 94, Springer LNCS v 839 pp 308\u2013317"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"M Burrows, M Abadi, RM Needham, \u201cA Logic of Authentication\u201d, in Proceedings of the Royal Society of London A v 426 (1989) pp 233\u2013271","journal-title":"Proceedings of the Royal Society of London A"},{"key":"11_CR4","unstructured":"CESG, \u201cSecuring Electronic Mail within HMG \u2014 part 1: Infrastructure and Protocol\u201d 21 March 1996, document T\/3113TL\/2776\/11; available at URL http:\/\/www.rdg.opengroup.org\/public\/tech\/security\/pki\/casm\/casm.htm"},{"issue":"6","key":"11_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W Diffie, ME Hellman, \u201cNew Directions in Cryptography\u201d, in IEEE Transactions on Information Theory, IT-22 no 6 (November 1976) p 644\u2013654","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR6","unstructured":"Electronic Privacy Information Center, 1996 EPIC Cryptography and Privacy Sourcebook, Washington, DC"},{"key":"11_CR7","unstructured":"US Department of Commerce, \u2018Escrowed Encryption Standard\u2019, FIPS PUB 185, February 1994"},{"key":"11_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-44750-4_18","volume-title":"Advances in Cryptology \u2014 CRYPTO 95","author":"Y. Frankel","year":"1995","unstructured":"Y Frankel, M Yung, Escrow Encryption Systems Visited: Attacks, Analysis and Designs\u201d, in Advances in Cryptology \u2014 CRYPTO 95, Springer LNCS v 963 pp 222\u2013235"},{"key":"11_CR9","unstructured":"P Gutman, personal communication, July 96"},{"key":"11_CR10","unstructured":"D Herson, in interview with Kurt Westh Nielsen and J\u00e9r\u00f4me Thorel, 25 September 1996; Ingeni\u00f8ren\/Engineering Weekly 10\/04\/1996; available at http:\/\/www.ingenioeren.dk\/redaktion\/herson.htm"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"N Hickson, Department of Trade and Industry, speaking at \u2018Information Security \u2014 Is IT Safe?\u2019, IEE, Savoy Place, London, 27th June 1996","DOI":"10.1049\/ic:19960887"},{"key":"11_CR12","unstructured":"I Hollander, P Rajaram, C Tanno, \u201cKerberos on Wall Street\u201d, in Usenix Security 96 pp 105\u2013112"},{"key":"11_CR13","unstructured":"N Jefferies, C Mitchell, M Walker, \u201cA Proposed Architecture for Trusted Third Party Services\u201d, in proceedings of Cryptography Policy and Algorithms Conference, 3\u20135 July 1995, pp 67\u201381; published by Queensland University of Technology"},{"key":"11_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/BFb0032349","volume-title":"Cryptography: Policy and Algorithms","author":"N. Jefferies","year":"1996","unstructured":"N Jefferies, C Mitchell, M Walker, \u201cA Proposed Architecture for Trusted Third Party Services\u201d, in Cryptography: Policy and Algorithms, Springer LNCS v 1029 pp 98\u2013104; also appeared at the Public Key Infrastructure Invitational Workshop at MITRE, Virginia, USA, in September 1995 and PKS\u2019 96 in Z\u00fcrich on 1st October 1996"},{"key":"11_CR15","unstructured":"ID Jones, letter to R Anderson on behalf of GCHQ\u2019s Communications Electronics Security Group; available at http:\/\/www.cs.berkeley.edu\/~daw\/GCHQ\/"},{"key":"11_CR16","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of the Fourth Cambridge Workshop on Cryptographic Protocols","author":"T.M.A. Lomas","year":"1996","unstructured":"TMA Lomas, B Crispo, \u201cA New Certification Scheme\u201d, in Proceedings of the Fourth Cambridge Workshop on Cryptographic Protocols (1996), Springer LNCS series pp 19-32"},{"key":"11_CR17","unstructured":"TMA Lomas, MR Roe, \u201cForging a Clipper Message\u201d, in Communications of the ACM v 37 no 12 (Dec 94) p 12"},{"key":"11_CR18","unstructured":"U.S. National Security Agency, \u2018Secure Data Network System: Message Security Protocol (MSP)\u2019, SDN.701, revision 4.0 (January 1996)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"RM Needham, MD Schroder, \u201cUsing Encryption for Authentication in Large Networks of Computers\u201d, in Communications of the ACM vol 21 no 12 (Dec 78) pp 993\u2013999","DOI":"10.1145\/359657.359659"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"BC Neuman, T Ts\u2019o, \u201cKerberos: An Authentication Service for Computer Networks\u201d, in IEEE Communications Magazine v 32 no 9 (Sep 94) pp 33\u201338","DOI":"10.1109\/35.312841"},{"key":"11_CR21","unstructured":"Press Association, \u201cMove to Strengthen Information Security\u201d, 06\/10 1808"},{"key":"11_CR22","series-title":"Lect Notes Comput Sci","first-page":"86","volume-title":"Fast Software Encryption","author":"R.L. Rivest","year":"1994","unstructured":"RL Rivest, \u201cThe RC5 Encryption Algorithm\u201d, in Fast Software Encryption (1994), Springer LNCS v 1008 pp 86\u201396"},{"key":"11_CR23","unstructured":"Ro\u00dfnagel A, \u201cInstitutionell-organisatorische Gestaltung informationstechnischer Sicherungsinfrostrukturen\u201d, in Datenschutz und Datensicherung (5\/95) pp 259\u2013269"},{"key":"11_CR24","unstructured":"RL Rivest, B Lampson, \u201cA Simple Distributed Security Infrastructure\u201d, at http:\/\/theory.lcs.mit.edu\/~rivest\/publications.html"},{"key":"11_CR25","volume-title":"Applied Cryptography \u2014 Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"B Schneier, \u2018Applied Cryptography \u2014 Protocols, Algorithms, and Source Code in C\u2019 (second edition), John Wiley & Sons, New York, 1996","edition":"second edition"},{"key":"11_CR26","unstructured":"Zergo Ltd., \u2018The use of encryption and related services with the NHSnet\u2019, published by the NHS Executive Information Management Group 12\/4\/96, reference number E5254; available from the Department of Health, PO Box 410, Wetherby LS23 7LN; Fax +44 1937 845381"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T04:20:49Z","timestamp":1737346849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1997]]}}}