"Financial Institution Message Authentication", ANSI X9.9, 18 pp.; 1986. |
B. J. Chorley et al, "A Revised Definition of a Secure Communication Protocol and Its Implementation", National Physical Laboratory Report DITC May 1982, Apr. 1982. |
D. W. Davies et al, "A Message Authenticator Algorithm Suitable for a Main Frame Computer", National Physical Laboratory Report DITC 1783, Feb., 1983. |
"Message Authentication with Partial Encryption", Research Disclosure, Dec. 1988, #296, Kenneth Mason Publications Ltd, England, 1 page. |
R. E. Lennon et al, "Transaction Response Message Authentication (Public Key and Des)", IBM Technical Disclosure Bulletin, vol. 26, #8, Jan. 1984, pp. 4118-4120. |
O. Goldreich et al, "How to Construct Random Functions", Journal of the Association for Computing Machinery, vol. 33, No. 4, Oct. 1986, pp. 792-807. |
O. Goldreich et al, "On the Cryptographic Applications of Random Functions", Laboratory for Computer Science, M.I.T., pp. 276-287, No Date. |
R. R. Jueneman et al, "Message Authentication", IEEE Communications Magazine, vol. 23, #9, Sep. 1985. |
"Data Encryption Standard", Federal Information Processing Standards Publication 46, Jan. 15, 1977, pp. 659-670. |
B. Preneel et al, "Collision-Free Hashfunctions Based on Blockcipher Algorithms", ICCST, 1989, Zurich, Switzerland, pp. 203-210. |
A. Beutelspacher et al, "Perfect and Essentially Perfect Authentication Schemes", Siemens AG, Federal Republic of Germany, pp. 167-170, No Date. |
P. G. Comba et al, "Exponentiation Cryptosystems on the IBM PC", IBM Systems Journal, vol. 29, No. 4, 1990, pp. 526-538. |
S. Goldwasser et al, "Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks", SIAM J. Comput., vol. 17, No. 2, Apr. 1988, pp. 281-309. |