Number | Name | Date | Kind |
---|---|---|---|
4309569 | Merkle | Jan 1982 | A |
4388643 | Aminetzah | Jun 1983 | A |
4872200 | Jansen | Oct 1989 | A |
4887296 | Horne | Dec 1989 | A |
4932056 | Shamir | Jun 1990 | A |
4995082 | Schnorr | Feb 1991 | A |
5381481 | Gammie et al. | Jan 1995 | A |
5418947 | Hsu et al. | May 1995 | A |
5432852 | Leighton et al. | Jul 1995 | A |
5434919 | Chaum | Jul 1995 | A |
5481609 | Cohen et al. | Jan 1996 | A |
5485577 | Eyer et al. | Jan 1996 | A |
5502767 | Sasuta et al. | Mar 1996 | A |
5608801 | Aiello et al. | Mar 1997 | A |
5615265 | Coutrot | Mar 1997 | A |
5761669 | Montague et al. | Jun 1998 | A |
5903649 | Schwenk | May 1999 | A |
6097811 | Micali | Aug 2000 | A |
6222923 | Schwenk | Apr 2001 | B1 |
6373948 | Wool | Apr 2002 | B1 |
6487720 | Ohishi | Nov 2002 | B1 |
Number | Date | Country |
---|---|---|
0 343 805 | May 1989 | EP |
0 450 841 | Mar 1991 | EP |
Entry |
---|
J. McCormac, European Scrambling Systems, Circuits Tactics and Techniques (“The Black Book”), Waterford University Press, pp. 2-79, 4-10 and 4-11 (1996). |
O. Goldreich et al., How to Construct Random Functions, J. of Ass'n for Computing Machinery, vol. 33, No. 4, 792-807 (Oct. 1986). |
Guillou et al. “Encipherment and Conditional Access” SMPTE Journal, vol. 103, No. 6, 398-406, Jun. 1994. |