Issued Patents All Time
Showing 1–22 of 22 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7236592 | Efficient stream cipher system and method | Shai Halevi, Charanjit Singh Jutla | 2007-06-26 |
| 7100050 | Secured signal modification and verification with privacy control | Frederick C. Mintzer, Charles P. Tresser, Samuel Weber, Chai Wah Wu, Minerva M. Yeung | 2006-08-29 |
| 6996543 | System for protection of goods against counterfeiting | Claude A. Greengard, Charles P. Tresser, Chai Wah Wu | 2006-02-07 |
| 6301362 | Method and apparatus for cryptographically transforming an input block into an output block | Stephen M. Matyas, Donald B. Johnson | 2001-10-09 |
| 6256736 | Secured signal modification and verification with privacy control | Frederick C. Mintzer, Charles P. Tresser, Chai Wah Wu, Minerva M. Yeung | 2001-07-03 |
| 6243470 | Method and apparatus for advanced symmetric key block cipher with variable length key and block | Rosario Gennaro, Shai Halevi, Charanjit Singh Jutla, Stephen M. Matyas, Mohammed Peyravian +2 more | 2001-06-05 |
| 6192129 | Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length key and block | Rosario Gennaro, Shai Halevi, Charanjit Singh Jutla, Stephen M. Matyas, Mohammed Peyravian +2 more | 2001-02-20 |
| 6189095 | Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks | Rosario Gennaro, Shai Halevi, Charanjit Singh Jutla, Stephen M. Matyas, Luke O'Connor +3 more | 2001-02-13 |
| 6185679 | Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks | Rosario Gennaro, Shai Halevi, Charanjit Singh Jutla, Stephen M. Matyas, Luke O'Connor +3 more | 2001-02-06 |
| 6185304 | Method and apparatus for a symmetric block cipher using multiple stages | Rosario Gennaro, Shai Halevi, Charanjit Singh Jutla, Stephen M. Matyas, Luke O'Connor +3 more | 2001-02-06 |
| 6101275 | Method for finding a best test for a nominal attribute for generating a binary decision tree | Se J. Hong, Jonathan R. M. Hosking | 2000-08-08 |
| 6069955 | System for protection of goods against counterfeiting | Claude A. Greengard, Charles P. Tresser, Chai Wah Wu | 2000-05-30 |
| 5835597 | Software-efficient pseudorandom function and the use thereof for decryption | Phillip Rogaway | 1998-11-10 |
| 5796827 | System and method for near-field human-body coupling for encrypted communication with identification cards | Prabhakar Raghavan, Thomas G. Zimmerman | 1998-08-18 |
| 5768390 | Cryptographic system with masking | Donald B. Johnson, Stephen M. Matyas | 1998-06-16 |
| 5675652 | Computer readable device implementing a software-efficient pseudorandom function encryption | Phillip Rogaway | 1997-10-07 |
| 5661807 | Authentication system using one-time passwords | Richard Henry Guski, Raymond Craig Larson, Stephen M. Matyas, Donald B. Johnson | 1997-08-26 |
| 5592553 | Authentication system using one-time passwords | Richard Henry Guski, Raymond Craig Larson, Stephen M. Matyas, Donald B. Johnson | 1997-01-07 |
| 5454039 | Software-efficient pseudorandom function and the use thereof for encryption | Phillip Rogaway | 1995-09-26 |
| 4908861 | Data authentication using modification detection codes based on a public one way encryption function | Bruno O. Brachtl, Myrna M. Hyden, Stephen M. Matyas, Carl H. W. Meyer, Jonathan Oseas +2 more | 1990-03-13 |
| 4675650 | Run-length limited code without DC level | Bruce P. Kitchens | 1987-06-23 |
| 4564944 | Error correcting scheme | Richard F. Arnold, John Cocke, Adrian E. Seigler, Gary E. Strait | 1986-01-14 |