| Number | Name | Date | Kind |
|---|---|---|---|
| 4200770 | Hellman et al. | Apr 1980 | |
| 4218582 | Hellman et al. | Aug 1980 | |
| 4326098 | Bouricius | Apr 1982 | |
| 4393269 | Konheim et al. | Jul 1983 | |
| 4405829 | Rivest et al. | Sep 1983 | |
| 4850017 | Matyas, Jr. et al. | Jul 1989 | |
| 4853961 | Pastor | Aug 1989 | |
| 4885777 | Takaragi et al. | Dec 1989 | |
| 4893338 | Pastor | Jan 1990 | |
| 4908861 | Brachtl et al. | Mar 1990 | |
| 4918728 | Matyas et al. | Apr 1990 | |
| 4924514 | Matyas et al. | May 1990 | |
| 4924515 | Matyas et al. | May 1990 | |
| 4941176 | Matyas et al. | Jul 1990 | |
| 5001752 | Fischer | Mar 1991 | |
| 5003593 | Mihm, Jr. | Mar 1991 | |
| 5005200 | Fischer | Apr 1991 | |
| 5164988 | Matyas et al. | Nov 1992 |
| Entry |
|---|
| R. W. Jones, "Some Techniques for Handling Encipherment Keys," ICL Technical Journal, Nov. 1982, pp. 175-188. |
| D. W. Davies and W. L. Price, "Security for Computer Networks," John Wiley & Sons, N.Y., 1984, Sec. 6.5, Key Management With Tagged Keys, pp. 168-172. |
| W. Diffie et al., "Privacy and Authentication: An Introduction to Cryptography," Proc. of IEEE, vol. 67, No. 3, Mar. 1979; pp. 397-427. |