| Number | Name | Date | Kind |
|---|---|---|---|
| 4218738 | Matyas et al. | Aug 1980 | |
| 4223403 | Konheim et al. | Sep 1980 | |
| 4227253 | Ehrsam et al. | Oct 1980 | |
| 4386623 | Smid et al. | Aug 1983 | |
| 4500750 | Elander et al. | Feb 1985 | |
| 4503287 | Morris et al. | Mar 1985 | |
| 4578536 | Zeidler | Mar 1986 | |
| 4633037 | Serpell | Dec 1986 | |
| 4683968 | Applebaum et al. | Aug 1987 | |
| 4713753 | Boebert et al. | Dec 1987 | |
| 4723283 | Nasagawa et al. | Feb 1988 | |
| 4723284 | Muck et al. | Feb 1988 | |
| 4747050 | Brachtl et al. | May 1988 | |
| 4755940 | Brachtl et al. | Jul 1988 | |
| 4850017 | Matyas et al. | Jul 1989 |
| Entry |
|---|
| "Some Techniques for Handling Encipherment Keys", R. W. Jones, ICL Tech. Journal (11/82) pp. 175-188. |
| "Security for Computer Networks", Davies et al., John Wiley & Sons, pp. 168-172. |
| Number | Date | Country | |
|---|---|---|---|
| Parent | 238010 | Aug 1988 |