| Number | Name | Date | Kind |
|---|---|---|---|
| 4309569 | Merkle | Jan 1982 | A |
| 4388643 | Aminetzah | Jun 1983 | A |
| 4872200 | Jansen | Oct 1989 | A |
| 4887296 | Horne | Dec 1989 | A |
| 4932056 | Shamir | Jun 1990 | A |
| 4995082 | Schnorr | Feb 1991 | A |
| 5381481 | Gammie et al. | Jan 1995 | A |
| 5418947 | Hsu et al. | May 1995 | A |
| 5432852 | Leighton et al. | Jul 1995 | A |
| 5434919 | Chaum | Jul 1995 | A |
| 5481609 | Cohen et al. | Jan 1996 | A |
| 5485577 | Eyer et al. | Jan 1996 | A |
| 5502767 | Sasuta et al. | Mar 1996 | A |
| 5608801 | Aiello et al. | Mar 1997 | A |
| 5615265 | Coutrot | Mar 1997 | A |
| 5761669 | Montague et al. | Jun 1998 | A |
| 5903649 | Schwenk | May 1999 | A |
| 6097811 | Micali | Aug 2000 | A |
| 6222923 | Schwenk | Apr 2001 | B1 |
| 6373948 | Wool | Apr 2002 | B1 |
| 6487720 | Ohishi | Nov 2002 | B1 |
| Number | Date | Country |
|---|---|---|
| 0 343 805 | May 1989 | EP |
| 0 450 841 | Mar 1991 | EP |
| Entry |
|---|
| J. McCormac, European Scrambling Systems, Circuits Tactics and Techniques (“The Black Book”), Waterford University Press, pp. 2-79, 4-10 and 4-11 (1996). |
| O. Goldreich et al., How to Construct Random Functions, J. of Ass'n for Computing Machinery, vol. 33, No. 4, 792-807 (Oct. 1986). |
| Guillou et al. “Encipherment and Conditional Access” SMPTE Journal, vol. 103, No. 6, 398-406, Jun. 1994. |