This patent application is a continuation-in-part of U.S. application Ser. No. 08/336,766 an allowed prior application, filed Nov. 9, 1994, that has matured into U.S. Pat. No. 5,717,760, and that issued Feb. 10, 1998. The disclosure of this patent is hereby incorporated by reference as though set out at length herein. This application is also closely related to pending U.S. patent application Ser. No. 09/019,915.
Number | Name | Date | Kind |
---|---|---|---|
4751733 | Delayaye et al. | Jun 1988 | |
5001753 | Davio et al. | Mar 1991 | |
5077793 | Falk et al. | Dec 1991 | |
5113444 | Vobach | May 1992 | |
5307412 | Vobach | Apr 1994 | |
5412429 | Liu | May 1995 |
Entry |
---|
Excerpts from the books: |
A. Applied Cryptography, Second Edition, by Bruce Schneier, 1996, pp. 13-15, and 304-306. |
B. Cryptography: An Introduction to Computer Security, by Jennifer Seberry and Josef Pierprzyk, 1989, pp. 70 and 71; and. |
C. Crytography and Secure Communications, by Man Yound Rhee, 1994, pp. 12, and 13. |
Neal Koblitz, Number Theory and Cryptography, 2e, pp. 1-2, 65-76, 1994. |
Bruce Schneier, Applied Cryptography, 2e, pp. 10-13, 189-211, 242-254, 304-306, 423-428, 1996. |
Michael E. Marotta, The Code Book, All About Unbreakable Codes and How to Use Them, pp. 32-36, 1983. |
Number | Date | Country | |
---|---|---|---|
Parent | 336766 | Nov 1994 |