| Number | Date | Country | Kind |
|---|---|---|---|
| 9-105609 | Apr 1997 | JP |
| Number | Name | Date | Kind |
|---|---|---|---|
| 4074066 | Ehrsam et al. | Feb 1978 | A |
| 4078152 | Tuckerman | Mar 1978 | A |
| 4157454 | Becker | Jun 1979 | A |
| 4229818 | Matyas | Oct 1980 | A |
| 4447672 | Nakamura | May 1984 | A |
| 4944006 | Citta | Jul 1990 | A |
| 5442705 | Miyano | Aug 1995 | A |
| Number | Date | Country |
|---|---|---|
| 4016203 | Nov 1991 | DE |
| 012974 | Jul 1980 | EP |
| 752770 | Jan 1997 | EP |
| 9118460 | Nov 1991 | WO |
| Entry |
|---|
| Schneier, Applied Cryptography, John Wiley, Oct. 1995.* |
| Denning, Cryoptographic and Data Security, 1982.* |
| Handbook of Applied Cryptography, CRC Press, 1997.* |
| Cryptanalysis of Multiple Modes of Operation, by E. Biham, Processings of the Conference on the Theory and Applications of Cryptology, DE, Berlin, Springer, vol. CONF. 4, 1994, pp. 278-292. |