Number | Name | Date | Kind |
---|---|---|---|
5001752 | Fischer | Mar 1991 | A |
5235642 | Wobber et al. | Aug 1993 | A |
5390247 | Fischer | Feb 1995 | A |
5473692 | Davis | Dec 1995 | A |
5539828 | Davis | Jul 1996 | A |
5559884 | Davidson et al. | Sep 1996 | A |
5568552 | Davis | Oct 1996 | A |
5592553 | Guski et al. | Jan 1997 | A |
5745678 | Herzberg et al. | Apr 1998 | A |
5757915 | Aucsmith et al. | May 1998 | A |
5796840 | Davis | Aug 1998 | A |
5805712 | Davis | Sep 1998 | A |
5858939 | Davis | Oct 1998 | A |
5844986 | Davis | Dec 1998 | A |
5892904 | Atkinson et al. | Apr 1999 | A |
5937063 | Davis | Aug 1999 | A |
5940513 | Aucsmith et al. | Aug 1999 | A |
5949881 | Davis | Sep 1999 | A |
5966446 | Davis | Oct 1999 | A |
5970147 | Davis | Oct 1999 | A |
6021201 | Bakhle et al. | Feb 2000 | A |
6058478 | Davis | May 2000 | A |
6175925 | Nardone et al. | Jan 2001 | B1 |
Number | Date | Country |
---|---|---|
0686906 | Dec 1995 | EP |
0778512 | Jun 1997 | EP |
WO 9845768 | Oct 1998 | WO |
Entry |
---|
Schneier, Applied Cryptography, Oct. 1995, John Wiley and Sons, Inc., pp. 185-187. |