| Number | Name | Date | Kind |
|---|---|---|---|
| 4633036 | Hellman et al. | Dec 1986 | A |
| 5005200 | Fischer | Apr 1991 | A |
| 5210795 | Lipner et al. | May 1993 | A |
| RE34954 | Haber et al. | May 1995 | E |
| 5659616 | Sudia | Aug 1997 | A |
| 5706512 | Bahls et al. | Jan 1998 | A |
| 5706513 | Bahls et al. | Jan 1998 | A |
| 5719938 | Haas et al. | Feb 1998 | A |
| 5818936 | Mashayekhi | Oct 1998 | A |
| 5870475 | Allan et al. | Feb 1999 | A |
| 6009174 | Tatebayashi et al. | Dec 1999 | A |
| 6154543 | Baltzley | Nov 2000 | A |
| Entry |
|---|
| Schneier, “Applied Cryptography, 2nd Ed.,” Section 24.5, pp. 566-571, 1996.* |
| Schneier, “Applied Cryptography, 2nd Ed.,” Section 8.4, pp. 178-179, 1996. |