Cryptography – Communication system using cryptography – Symmetric key cryptography
Reexamination Certificate
2003-12-04
2010-06-29
Moazzami, Nasser (Department: 2436)
Cryptography
Communication system using cryptography
Symmetric key cryptography
C380S059000, C365S078000, C365S080000, C365S189120, C365S240000, C377S054000, C377S057000, C377S064000, C708S233000, C708S234000, C708S252000, C708S253000, C708S256000, C708S521000, C708S524000, C327S241000, C327S403000, C711S109000, C345S100000, C345S505000, C345S506000, C712S212000, C382S303000, C382S304000
Reexamination Certificate
active
07747020
ABSTRACT:
Performing a hash algorithm in a processor architecture to alleviate performance bottlenecks and improve overall algorithm performance. In one embodiment of the invention, the hash algorithm is pipelined within the processor architecture.
REFERENCES:
patent: 5365588 (1994-11-01), Bianco et al.
patent: 5491752 (1996-02-01), Kaufman et al.
patent: 5963646 (1999-10-01), Fielder et al.
patent: 6134603 (2000-10-01), Jones et al.
patent: 6847995 (2005-01-01), Hubbard et al.
patent: 7177421 (2007-02-01), Buer et al.
patent: 2002/0001384 (2002-01-01), Buer et al.
“On Recent Results for MD2, MD4, and MD5,” M.J.B. Robshaw, RSA Laboratories, Bulletin No. 4 Nov. 12, 1996.
Intel Corporation
Lane Thomas R.
Louie Oscar A
Moazzami Nasser
LandOfFree
Technique for implementing a security algorithm does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Technique for implementing a security algorithm, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Technique for implementing a security algorithm will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4243085