| Schneier, Applied Cryptography, Oct. 1993.* |
| Menezes et al, Handbook of Applied Cryptography, Oct. 1996.* |
| Schneier, Applied Cryptography, 1994, Wiley & Sons, Inc., pp. 34, 35, 45, 46, 372, 425-428.* |
| IEE Proceedings—Computers and Digital Techniques, May 1994, vol. 141, No. 3, L. Harn, Public-Key Cryptosystem Design Based on Factoring and Discrete Logarithms, pp. 193-195. |
| IEEE Global Telecomumunications Conference, (1993), vol. 1, H. Tsubakiyama, Security for Information Data Broadcasting system with Conditional-Access Control, pp. 164-170. |
| IEEE Personal Communications,(1994), A. Aziz, Privacy and Authentication for Wireless Local Area Networks, pp. 25-31. |
| IEEE Journal on Selected Areas in Communications, (1993), vol. 11, No. 6, M. Beller et al, Privacy and Authentication on a Portable Communications System, pp. 821-829. |
| Joint Experts Meeting on Privacy and Authentication for Personal Communications, P&A JEM (1993), M. Beller, Proposed Authentication and Key Agreement Protocol for PCS, pp. 1-12. |