Number | Name | Date | Kind |
---|---|---|---|
4200770 | Hellman et al. | Apr 1980 | |
4218582 | Hellman et al. | Aug 1980 | |
4405829 | Rivest et al. | Sep 1983 | |
4850017 | Matyas, Jr. et al. | Jul 1989 | |
4908861 | Brachtl et al. | Mar 1990 | |
4918728 | Matyas et al. | Apr 1990 | |
4924514 | Matyas et al. | May 1990 | |
4924515 | Matyas et al. | May 1990 | |
4941176 | Matyas et al. | Jul 1990 |
Entry |
---|
R. W. Jones, "Some Techniques for Handling Encipherment Keys", ICL Technical Journal, Nov. 1982, pp. 175-188. |
D. W. Davies & W. L. Price, "Security for Computer Networks", John Wiley & Sons, NY, 1984, Sec. 6.5, Key Management with Tagged Keys, pp. 168-172. |
W. Diffie, et al., "Privacy and Authentication: An Introduction to Ctyptography", Proc. of IEEE, vol. 67, No. 3, 3/79, pp. 397-427. |