| Quisquater et al., Fast Decipherment for RSA Public-Key Cryptosystem, Oct. 14, 1982, Electronic Letters, vol. 18, No. 21, pp. 905-907.* |
| Menezes et al., Handbook of Applied Cryptography, 1996, pp. 613-627.* |
| Schneier, Applied Cryptography, Second Edition, 1995, pp. 242-245, 249, 250, and 466-470, Oct. 1982.* |
| MicroSentinelUX™, Securing the future of software—Developer's Guide, Rainbow Technologies, Irvine, CA 92718, 1992; 107 pages. |
| Comba, P.G., “Exponentiation Cryptosystems on the IBM PC”, IBM Systems Journal, vol. 29, No. 4, Jan. 1, 1990, pp. 526-538. |
| Bond, Dieter et al., “Optimized Software Implementations of the Modular Exponentiation on General Purpose Microprocessors”, Computers & Security Journal, vol. 8, No. 7, Nov. 1, 1989, pp. 621-630. |
| Quisquater, J.J. et al., “Fast Decipherment Algorithm for RSA Public-Key Cryptosystem”, Electronics Letters, vol. 18, No. 21, Oct. 14, 1982, pp. 905-907. |
| Copy of European Search Report for related European Patent Application No. 98 301 533.0. |
| Victor, An Efficient RSA Hardware Implementation, by Orup et al., Lecture Notes In Computer Science (Advances In Cryptology-Eurocrypt '90), Springer- Verlag, 1991, pp. 245-252. |
| Fast Implementation Of RSA Cryptography, by Shand et al., 11th Symposium On Computer Arithmetic, IEEE, pp. 252-259. |
| Analyzing And Comparing Montgomery Multiplication Algorithms, by Koc et al., IEEE Micro, Jun. 1996, pp. 26-33. |