| Number | Name | Date | Kind |
|---|---|---|---|
| 4453074 | Weinstein | Jun 1984 | |
| 4484025 | Ostermann et al. | Nov 1984 | |
| 4723284 | Munck et al. | Feb 1988 | |
| 5179591 | Hardy et al. | Jan 1993 | |
| 5204961 | Barlow | Apr 1993 | |
| 5386468 | Akiyama et al. | Jan 1995 | |
| 5408259 | Warwick | Apr 1995 | |
| 5497420 | Garneau et al. | Mar 1996 | |
| 5548721 | Denslow | Aug 1996 | |
| 5563948 | Diehl et al. | Oct 1996 | |
| 5671285 | Newman | Sep 1997 |
| Entry |
|---|
| Bruce Shneier, "Applied Cryptology: Protocols, Algorithms, and Source Code in C", 1st edition John Wiley and Sons, N.Y. (1992). |