Number | Name | Date | Kind |
---|---|---|---|
4559637 | Weber | Dec 1985 | |
4639293 | Lew | Jan 1987 | |
4665497 | Yamamura et al. | May 1987 | |
4682287 | Mizuno et al. | Jul 1987 | |
4710888 | Burke et al. | Dec 1987 | |
4831438 | Bellman, Jr. et al. | May 1989 | |
5521815 | Rose, Jr. | May 1996 | |
5602987 | Harari et al. | Feb 1997 | |
5646994 | Hill | Jul 1997 | |
5654891 | Naccache et al. | Aug 1997 | |
5774374 | Scott et al. | Jun 1998 | |
5799083 | Brothers et al. | Aug 1998 | |
5815093 | Kikinis | Sep 1998 | |
5828751 | Walker et al. | Oct 1998 |
Entry |
---|
Bruce Schneier, "Applied Cryptography: Protocols, Algorithms, and Source Code in C" 2nd edition, chapter 19, pp. 461-482, John Wiley & Sons, Oct. 1995. |
"Encyclopedia of Computer Science," Anthony Ralston & Chester L. Meek, editors, pp. 604-606, Van Nostrand Reinhold Company, 1976. |