| Number | Name | Date | Kind |
|---|---|---|---|
| 3706941 | Cohn | Dec 1972 | A |
| 4168396 | Best | Sep 1979 | A |
| 4306289 | Lumley | Dec 1981 | A |
| 4562305 | Gaffney, Jr. | Dec 1985 | A |
| 4634807 | Chorley et al. | Jan 1987 | A |
| 4780905 | Cruts et al. | Oct 1988 | A |
| 4823308 | Knight | Apr 1989 | A |
| 4847902 | Hampson | Jul 1989 | A |
| 5058164 | Elmer et al. | Oct 1991 | A |
| 5182770 | Medveczky et al. | Jan 1993 | A |
| 5224166 | Elmer et al. | Jun 1993 | A |
| 5557503 | Isaacs et al. | Sep 1996 | A |
| 5671275 | Ezuriko | Sep 1997 | A |
| 5812662 | Hsu et al. | Sep 1998 | A |
| 5892826 | Brown et al. | Apr 1999 | A |
| Entry |
|---|
| Bruce Schneier, Aplied Cryptography, p. 398-399, 423, 1996.* |
| Horst Feistel, Cryptography and Computer Privacy, Scientific American, 228(5), 15-23, May 1973.* |
| Bruce Schneier, Applied Cryptography, 2e, 423, 294-300, 1996.* |
| Richard Voss and John Clarke 1/f noise in Music: Music from 1/f Noise, J. Acoust. Soc. Am. 63(1), Jan. 1978.* |
| Schniere, Applied Cryptology, John Wiley, pp. 2-3, 11-12, 210-211, 265-301, 423, Oct. 1995.* |
| Menezes, et. al., Handbook of Applied Cryptography, CRC Press, 1996. |