| 7236592 |
Efficient stream cipher system and method |
Shai Halevi, Charanjit Singh Jutla |
2007-06-26 |
| 7100050 |
Secured signal modification and verification with privacy control |
Frederick C. Mintzer, Charles P. Tresser, Samuel Weber, Chai Wah Wu, Minerva M. Yeung |
2006-08-29 |
| 6996543 |
System for protection of goods against counterfeiting |
Claude A. Greengard, Charles P. Tresser, Chai Wah Wu |
2006-02-07 |
| 6301362 |
Method and apparatus for cryptographically transforming an input block into an output block |
Stephen M. Matyas, Donald B. Johnson |
2001-10-09 |
| 6256736 |
Secured signal modification and verification with privacy control |
Frederick C. Mintzer, Charles P. Tresser, Chai Wah Wu, Minerva M. Yeung |
2001-07-03 |
| 6243470 |
Method and apparatus for advanced symmetric key block cipher with variable length key and block |
Rosario Gennaro, Shai Halevi, Charanjit Singh Jutla, Stephen M. Matyas, Mohammed Peyravian +2 more |
2001-06-05 |
| 6192129 |
Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length key and block |
Rosario Gennaro, Shai Halevi, Charanjit Singh Jutla, Stephen M. Matyas, Mohammed Peyravian +2 more |
2001-02-20 |
| 6189095 |
Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks |
Rosario Gennaro, Shai Halevi, Charanjit Singh Jutla, Stephen M. Matyas, Luke O'Connor +3 more |
2001-02-13 |
| 6185679 |
Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks |
Rosario Gennaro, Shai Halevi, Charanjit Singh Jutla, Stephen M. Matyas, Luke O'Connor +3 more |
2001-02-06 |
| 6185304 |
Method and apparatus for a symmetric block cipher using multiple stages |
Rosario Gennaro, Shai Halevi, Charanjit Singh Jutla, Stephen M. Matyas, Luke O'Connor +3 more |
2001-02-06 |
| 6101275 |
Method for finding a best test for a nominal attribute for generating a binary decision tree |
Se J. Hong, Jonathan R. M. Hosking |
2000-08-08 |
| 6069955 |
System for protection of goods against counterfeiting |
Claude A. Greengard, Charles P. Tresser, Chai Wah Wu |
2000-05-30 |
| 5835597 |
Software-efficient pseudorandom function and the use thereof for decryption |
Phillip Rogaway |
1998-11-10 |
| 5796827 |
System and method for near-field human-body coupling for encrypted communication with identification cards |
Prabhakar Raghavan, Thomas G. Zimmerman |
1998-08-18 |
| 5768390 |
Cryptographic system with masking |
Donald B. Johnson, Stephen M. Matyas |
1998-06-16 |
| 5675652 |
Computer readable device implementing a software-efficient pseudorandom function encryption |
Phillip Rogaway |
1997-10-07 |
| 5661807 |
Authentication system using one-time passwords |
Richard Henry Guski, Raymond Craig Larson, Stephen M. Matyas, Donald B. Johnson |
1997-08-26 |
| 5592553 |
Authentication system using one-time passwords |
Richard Henry Guski, Raymond Craig Larson, Stephen M. Matyas, Donald B. Johnson |
1997-01-07 |
| 5454039 |
Software-efficient pseudorandom function and the use thereof for encryption |
Phillip Rogaway |
1995-09-26 |
| 4908861 |
Data authentication using modification detection codes based on a public one way encryption function |
Bruno O. Brachtl, Myrna M. Hyden, Stephen M. Matyas, Carl H. W. Meyer, Jonathan Oseas +2 more |
1990-03-13 |
| 4675650 |
Run-length limited code without DC level |
Bruce P. Kitchens |
1987-06-23 |
| 4564944 |
Error correcting scheme |
Richard F. Arnold, John Cocke, Adrian E. Seigler, Gary E. Strait |
1986-01-14 |