Issued Patents All Time
Showing 126–150 of 270 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8380923 | Queue arrays in network devices | Mark Rosenbluth, Debra Bernstein | 2013-02-19 |
| 8363828 | Diffusion and cryptographic-related operations | Vinodh Gopal, Kirk S. Yap, Wajdi K. Feghali, Robert P. Ottavi, Sean M. Gulley | 2013-01-29 |
| 8346839 | Efficient advanced encryption standard (AES) datapath using hybrid rijndael S-box | Erdinc Ozturk, Vinodh Gopal, Wajdi K. Feghali, Kirk S. Yap | 2013-01-01 |
| 8325069 | System, method, and apparatus for a scalable processor architecture for a variety of string processing applications | Vinodh Gopal, Christopher F. Clark, Wadji K. Feghali | 2012-12-04 |
| 8316191 | Memory controllers for processor having multiple programmable units | William R. Wheeler, Bradley A. Burres, Matthew J. Adiletta | 2012-11-20 |
| 8312363 | Residue generation | Vinodh Gopal, Erdinc Ozturk, Wajdi K. Feghali | 2012-11-13 |
| 8301680 | Apparatus and method to compute reciprocal approximations | Vinodh Gopal, Wajdi K. Feghali | 2012-10-30 |
| 8271570 | Unified integer/galois field (2m) multiplier architecture for elliptic-curve crytpography | Vinodh Gopal, Erdinc Ozturk, Wajdi K. Feghali | 2012-09-18 |
| 8189792 | Method and apparatus for performing cryptographic operations | Brent R. Boswell, Kirk S. Yap, Wajdi K. Feghali, Vinodh Gopal, Srinivas Chennupaty +1 more | 2012-05-29 |
| 8073892 | Cryptographic system, method and multiplier | Wajdi K. Feghali, William C. Hasenplaugh, Daniel Cutter, Vinodh Gopal, Gunnar Gaubatz | 2011-12-06 |
| 8065678 | Method and apparatus for scheduling the processing of commands for execution by cryptographic algorithm cores in a programmable network processor | Jaroslaw J. Sydir, Chen-Chi Kuo, Kamal J. Koshy, Wajdi K. Feghali, Bradley A. Burres | 2011-11-22 |
| 8042025 | Determining a message residue | Vinodh Gopal, Wajdi K. Feghali, Erdinc Ozturk, Shay Gueron | 2011-10-18 |
| 8041945 | Method and apparatus for performing an authentication after cipher operation in a network processor | Jaroslaw J. Sydir, Kamal J. Koshy, Wajdi K. Feghali, Bradley A. Burres | 2011-10-18 |
| 8020142 | Hardware accelerator | William C. Hasenplaugh, Wajdi K. Feghali, Daniel Cutter, Vinodh Gopal, Gunnar Gaubatz | 2011-09-13 |
| 8005210 | Modulus scaling for elliptic-curve cryptography | Erdinc Ozturk, Vinodh Gopal, Wajdi K. Feghali | 2011-08-23 |
| 7991983 | Register set used in multithreaded parallel processor architecture | Matthew J. Adiletta, William R. Wheeler, Debra Bernstein, Donald F. Hooper | 2011-08-02 |
| 7986779 | Efficient elliptic-curve cryptography based on primality of the order of the ECC-group | Erdinc Ozturk, Vinodh Gopal, Wajdi K. Feghali | 2011-07-26 |
| 7978846 | Scale-invariant barrett reduction for elliptic-curve cyrptography | Erdinc Ozturk, Vinodh Gopal, Wajdi K. Feghali | 2011-07-12 |
| 7953221 | Method for processing multiple operations | Wajdi K. Feghali, Stephanie L. Hirnak, Makaram Raghunandan, Yogesh Bansal, Kirk S. Yap | 2011-05-31 |
| 7925011 | Method for simultaneous modular exponentiations | Vinodh Gopal, Erdinc Ozturk, Kaan Yuksel, Gunnar Gaubatz, Wajdi K. Feghali | 2011-04-12 |
| 7912886 | Configurable exponent FIFO | Vinodh Gopal, Wajdi K. Feghali, Daniel F. Cutter, Robert P. Ottavi | 2011-03-22 |
| 7900022 | Programmable processing unit with an input buffer and output buffer configured to exclusively exchange data with either a shared memory logic or a multiplier based upon a mode instruction | Wajdi K. Feghali, William C. Hasenplaugh, Daniel F. Cutter, Vinodh Gopal | 2011-03-01 |
| 7895239 | Queue arrays in network devices | Mark Rosenbluth, Debra Bernstein | 2011-02-22 |
| 7886214 | Determining a message residue | Vinodh Gopal, Michael E. Kounavis | 2011-02-08 |
| 7872598 | Accelerated decompression | Selcuk Baktir, Vinodh Gopal, Prashant Paliwal, Wajdi K. Feghali | 2011-01-18 |