Number | Name | Date | Kind |
---|---|---|---|
4578530 | Zeidler | Mar 1986 | |
4649233 | Bass et al. | Mar 1987 | |
4771461 | Matyas | Sep 1988 | |
4916738 | Chandra et al. | Apr 1990 | |
5048085 | Abraham et al. | Sep 1991 | |
5535276 | Ganesan | Jul 1996 | |
5602918 | Chen et al. | Feb 1997 | |
5745574 | Muftic | Apr 1998 | |
5745576 | Abraham | Apr 1998 | |
5748735 | Ganesan | May 1998 | |
5784463 | Chen et al. | Jul 1998 | |
5796834 | Whitney | Aug 1998 | |
5822739 | Kara | Oct 1998 | |
5825880 | Sudia | Oct 1998 |
Entry |
---|
Bruce Schneier: “Applied Cryptography”, 2nd Ed., pp. 34-55, Oct. 18, 1995, John Wiley & Sons. |