Entry |
---|
Schneier, “Applied Cryptography”, 1995, pp. 38, 39.* |
“Using RSA Public Key Cryptography for Internet Security”, http://www64.netscape.com/newsref/ref/rsa.html, pp. 1-7, (1998). |
Clayton, R., “How public key cryptography works”, http://www.happyday.demon.co.uk./keys.htm, 1 page, (Mar. 4, 1998). |
Elgamal, T., et al., “Securing Communications on the Intranet and Over the Internet”, Securing Communications White Paper, http://www68.netscape.com/newsref/ref/128bit.html, pp. 1-22, (Jul. 1996). |