| Rosen, Examiner's Affidavit, Jun. 11, 1999.* |
| Microsoft Games, http://www.microsoft.com/Games/WEP/PRODINFO.HTM, Jun. 7,1999.* |
| Davis et al., “Cryptographic Randomness from Air Turbulence in Disk Drives”, Advances in Cryptology: Crypto '94, Springer Verlag, pp. 114-120. |
| A. Menezes et al., Handbook of Applied Cryptography, CRC Press, pp. 405-424. |
| A. Choudhury et al., “Copyright Protection for Electronic Publishing Over Computer Networks”, IEEE Network, May/Jun. 1995, pp. 12-20. |
| ISO/IEC 9594-1, “Information technology—Open Systems Interconnection—The Directory: Overview of concepts, models and services”, International Organization for Standardization, Geneva, Switzerland, 1995, pp. 1-20. |
| R. Rivest, “The MD5 Message-Digest Algorithm”, RFC 1321, pp. 1-18. |
| D. Knuth, The Art of Computer Programming, vol. 2, Seminumerical Algorithms, Addison-Wesley Publishing Co., Reading MA, 2nd Edition, 1981, pp. 38-73. |