Number | Name | Date | Kind |
---|---|---|---|
4525599 | Curran et al. | Jun 1985 | |
4750142 | Akiba et al. | Jun 1988 | |
4795893 | Ugon | Jan 1989 | |
5247564 | Zicker | Sep 1993 | |
5341497 | Younger | Aug 1994 | |
5357572 | Bianco et al. | Oct 1994 | |
5514981 | Tam et al. | May 1996 | |
5515540 | Grider et al. | May 1996 | |
5537055 | Smith et al. | Jul 1996 | |
5600818 | Weikmann | Feb 1997 | |
5737604 | Miller et al. | Apr 1998 | |
5784625 | Walker | Jul 1998 | |
6161180 | Matyas et al. | Dec 2000 |
Entry |
---|
Boneh, Dan, Richard A. DeMillo, Richard J. Lipton, Cryptoanalysis in the Presence of Hardware Faults, Sep. 25, 1996.* |
IBM Technical Disclosure Bulletin, Identification Card, Jul. 1980, vol. 23, NR 2, pp. 673-675. |