Schneier, Applied Cryptography, Oct. 1993.* |
Menezes et al, Handbook of Applied Cryptography, Oct. 1996.* |
Schneier, Applied Cryptography, 1994, Wiley & Sons, Inc., pp. 34, 35, 45, 46, 372, 425-428.* |
IEE Proceedings—Computers and Digital Techniques, May 1994, vol. 141, No. 3, L. Harn, Public-Key Cryptosystem Design Based on Factoring and Discrete Logarithms, pp. 193-195. |
IEEE Global Telecomumunications Conference, (1993), vol. 1, H. Tsubakiyama, Security for Information Data Broadcasting system with Conditional-Access Control, pp. 164-170. |
IEEE Personal Communications,(1994), A. Aziz, Privacy and Authentication for Wireless Local Area Networks, pp. 25-31. |
IEEE Journal on Selected Areas in Communications, (1993), vol. 11, No. 6, M. Beller et al, Privacy and Authentication on a Portable Communications System, pp. 821-829. |
Joint Experts Meeting on Privacy and Authentication for Personal Communications, P&A JEM (1993), M. Beller, Proposed Authentication and Key Agreement Protocol for PCS, pp. 1-12. |