WF

Wajdi K. Feghali

IN Intel: 186 patents #69 of 30,777Top 1%
TR Tahoe Research: 2 patents #16 of 215Top 8%
AC Alcatel Canada: 1 patents #117 of 332Top 40%
📍 Boston, MA: #3 of 5,993 inventorsTop 1%
🗺 Massachusetts: #48 of 88,656 inventorsTop 1%
Overall (All Time): #3,767 of 4,157,543Top 1%
190
Patents All Time

Issued Patents All Time

Showing 151–175 of 190 patents

Patent #TitleCo-InventorsDate
8380767 Polynomial-basis to normal-basis transformation for binary Galois-Fields GF(2m) Erdinc Ozturk, Vinodh Gopal, Gilbert M. Wolrich 2013-02-19
8363828 Diffusion and cryptographic-related operations Vinodh Gopal, Kirk S. Yap, Gilbert M. Wolrich, Robert P. Ottavi, Sean M. Gulley 2013-01-29
8346839 Efficient advanced encryption standard (AES) datapath using hybrid rijndael S-box Erdinc Ozturk, Vinodh Gopal, Gilbert M. Wolrich, Kirk S. Yap 2013-01-01
8312363 Residue generation Vinodh Gopal, Erdinc Ozturk, Gilbert M. Wolrich 2012-11-13
8301680 Apparatus and method to compute reciprocal approximations Vinodh Gopal, Gilbert M. Wolrich 2012-10-30
8271570 Unified integer/galois field (2m) multiplier architecture for elliptic-curve crytpography Vinodh Gopal, Erdinc Ozturk, Gilbert M. Wolrich 2012-09-18
8189792 Method and apparatus for performing cryptographic operations Brent R. Boswell, Kirk S. Yap, Gilbert M. Wolrich, Vinodh Gopal, Srinivas Chennupaty +1 more 2012-05-29
8073892 Cryptographic system, method and multiplier William C. Hasenplaugh, Gilbert M. Wolrich, Daniel Cutter, Vinodh Gopal, Gunnar Gaubatz 2011-12-06
8065678 Method and apparatus for scheduling the processing of commands for execution by cryptographic algorithm cores in a programmable network processor Jaroslaw J. Sydir, Chen-Chi Kuo, Kamal J. Koshy, Bradley A. Burres, Gilbert M. Wolrich 2011-11-22
8042025 Determining a message residue Vinodh Gopal, Gilbert M. Wolrich, Erdinc Ozturk, Shay Gueron 2011-10-18
8041945 Method and apparatus for performing an authentication after cipher operation in a network processor Jaroslaw J. Sydir, Kamal J. Koshy, Bradley A. Burres, Gilbert M. Wolrich 2011-10-18
8020142 Hardware accelerator Gilbert M. Wolrich, William C. Hasenplaugh, Daniel Cutter, Vinodh Gopal, Gunnar Gaubatz 2011-09-13
8005210 Modulus scaling for elliptic-curve cryptography Erdinc Ozturk, Vinodh Gopal, Gilbert M. Wolrich 2011-08-23
7986779 Efficient elliptic-curve cryptography based on primality of the order of the ECC-group Erdinc Ozturk, Vinodh Gopal, Gilbert M. Wolrich 2011-07-26
7978846 Scale-invariant barrett reduction for elliptic-curve cyrptography Erdinc Ozturk, Vinodh Gopal, Gilbert M. Wolrich 2011-07-12
7961877 Factoring based modular exponentiation Vinodh Gopal, Erdinc Ozturk, Matt Bace, Robert P. Ottavi 2011-06-14
7953221 Method for processing multiple operations Stephanie L. Hirnak, Makaram Raghunandan, Yogesh Bansal, Kirk S. Yap, Gilbert M. Wolrich 2011-05-31
7949130 Architecture and instruction set for implementing advanced encryption standard (AES) Shay Gueron, Vinodh Gopal 2011-05-24
7925011 Method for simultaneous modular exponentiations Vinodh Gopal, Erdinc Ozturk, Kaan Yuksel, Gunnar Gaubatz, Gilbert M. Wolrich 2011-04-12
7912886 Configurable exponent FIFO Vinodh Gopal, Gilbert M. Wolrich, Daniel F. Cutter, Robert P. Ottavi 2011-03-22
7900022 Programmable processing unit with an input buffer and output buffer configured to exclusively exchange data with either a shared memory logic or a multiplier based upon a mode instruction William C. Hasenplaugh, Gilbert M. Wolrich, Daniel F. Cutter, Vinodh Gopal 2011-03-01
7872598 Accelerated decompression Selcuk Baktir, Vinodh Gopal, Gilbert M. Wolrich, Prashant Paliwal 2011-01-18
7801299 Techniques for merging tables Gunnar Gaubatz, William C. Hasenplaugh, Bradley A. Burres, Kirk S. Yap 2010-09-21
7797612 Storage accelerator Vinodh Gopal, Yogesh Bansal, Gilbert M. Wolrich, Kirk S. Yap 2010-09-14
7747020 Technique for implementing a security algorithm 2010-06-29