| Number | Name | Date | Kind |
|---|---|---|---|
| 4525599 | Curran et al. | Jun 1985 | |
| 4750142 | Akiba et al. | Jun 1988 | |
| 4795893 | Ugon | Jan 1989 | |
| 5247564 | Zicker | Sep 1993 | |
| 5341497 | Younger | Aug 1994 | |
| 5357572 | Bianco et al. | Oct 1994 | |
| 5514981 | Tam et al. | May 1996 | |
| 5515540 | Grider et al. | May 1996 | |
| 5537055 | Smith et al. | Jul 1996 | |
| 5600818 | Weikmann | Feb 1997 | |
| 5737604 | Miller et al. | Apr 1998 | |
| 5784625 | Walker | Jul 1998 | |
| 6161180 | Matyas et al. | Dec 2000 |
| Entry |
|---|
| Boneh, Dan, Richard A. DeMillo, Richard J. Lipton, Cryptoanalysis in the Presence of Hardware Faults, Sep. 25, 1996.* |
| IBM Technical Disclosure Bulletin, Identification Card, Jul. 1980, vol. 23, NR 2, pp. 673-675. |