| Siromoney et. al. Public Key Cryptosystems Based on Word Problem, Proceedings of the ICOMIDC—Symposium on Mathematic of Computation, Apr. 25-29, 1988.* |
| Bruce Schneier, Applied Cryptography 2e, John Wiley pp. 1-3, 513-518, Oct. 1995.* |
| Wagner, A Public-key cryptosystem Based on the Word Problem, Crypto 84.* |
| Patterson, Mathematical Cryptology for scientist and Mathematicians, Rowman & Littlefield.* |
| Schneier, Applied Cryptology, John Wiley, 1995.* |
| International Search Report for PCT/US99/04126, mailed Aug. 17, 1998. |
| Blum L. et al. “A Simple Unpredictable Psuedo-Random Number Generator” Siam Journal on Computing, vol. 15, No. 2, May 1986, pp. 364-383, XP002037919. |
| Written Opinion for PCT/US99/04126, mailed Feb. 18, 2000. |
| Wayne Patterson, Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littefield, 1987, pp. 109-114. |
| Colin Adams, An Elementary Introduction to the Matematical Theory of Knots, Freeman, 1994. |
| Neal Wagner, et. al., A Public-Key Cryptosystem Based on the Word Problem, Crypto 84, 1985, 19-36. |
| P. Cohn, an Algerbraist Looks at Coding Theory, Bulletin of the Institute of Mathematics and Its Applications, 1989. (abstract). |
| G. Hofer, Automata Applied to Information Theory, Methods of Operation Research, 64, 1990, p. 463, 465 and 472. |
| Bruce Schneier, Applied Cryptography, 2e, John Wiley, 1996, 169-187, 420-428, fig 9-6. |
| Alfred Menezes, Paul Oorschot, and Scott, vanstone, Handbook of Applied Crytography, CRC Press, 1997, Chapter 12. |
| Diffie et. al., New Directions in Crytography, IEEE Transaction on Information Theory, vol. 22, No. 6. Nov. 1976. |