AcclaimIP-ad

Match Document Document Title
US20120321075 FAULT-RESISTANT EXPONENTIATIONI ALGORITHM  
A method for performing a m-ary right-to-left exponentiation using a base x, a secret exponent d and a modulus N, wherein m is a power of 2. A device having a processor and m+1 registers R[0]-R[m]...
US20140198912 Block Cipher Modes of Non-Malleable Operation  
A method and system for producing at least one ciphertext block from at least one plaintext block using a block cipher is described, the block cipher including an encryption function Enc, the...
US20080317242 DATA SCRAMBLING AND ENCRYPTION OF DATABASE TABLES  
An apparatus, program product and method protect data in a database table from unauthorized access through the combination of scrambling the data in the rows and columns of a database table and...
US20090092250 Methods and Systems for N-State Signal Processing with Binary Devices  
Linear Feedback Shift Registers (LFSRs) based 2p state with p>2 or p≧2 scramblers, descramblers, sequence generators and sequence detectors in binary implementation are provided. An LFSR may apply...
US20090177939 Method for Coding Biometric Data, Method for Controlling Identity and Devices for Carrying Out said Methods  
The invention relates to a coding method consisting of the following steps: biometric data associated with an individual is obtained; a word, relating to an error correction code, selected in...
US20090257583 CIPHER FEEDBACK WITH VARIABLE BLOCK CHAINING  
Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a current initialization vector (IV) is generated based on a previous block of...
US20140301546 PRECOMPUTING INTERNAL AES STATES IN COUNTER MODE TO PROTECT KEYS USED IN AES COMPUTATIONS  
Methods, media, and systems for, in one embodiment, protecting one or more keys in an encryption and/or decryption process can use precomputed values in the process such that at least a portion of...
US20150172042 EFFICIENT MODULAR ADDITION RESISTANT TO SIDE CHANNEL ATTACKS  
A cryptographic device performs modular addition between a first integer value x and a second integer value y in a processor by: obtaining a first masked input {circumflex over (x)}, a second...
US20110069833 EFFICIENT NEAR-DUPLICATE DATA IDENTIFICATION AND ORDERING VIA ATTRIBUTE WEIGHTING AND LEARNING  
A method to efficiently detect, and thus store, approximately duplicate or most likely duplicate files or data sets that will benefit from differencing technology rather than standard compression...
US20080170686 CONFIDENTIAL INFORMATION PROCESSING APPARATUS, CONFIDENTIAL INFORMATION PROCESSING DEVICE, AND CONFIDENTIAL INFORMATION PROCESSING METHOD  
The confidential information processing device according to the present invention includes: a stream analysis unit which determines the target data by analyzing the data stream; a cryptographic...
US20080112559 Substitution cipher text-encoding and un-encoding software and method  
A method or computer program for encoding or un-encoding data receives a keyword string and removes characters in the keyword string which are not in a pre-approved character set and duplicate...
US20090185677 SHORT MESSAGE ENCRYPTION  
A method and system for securely communicating information via a low bandwidth channel uses encryption that adds comparatively little overhead to the size of the transmission. This method and...
US20060056622 Protection of a DES algorithm  
A method for protecting the execution of an algorithmic calculation taking into account at least one valid piece of data and at least one secret key by an integrated circuit, and performing...
US20080130870 Data Processing Method And Related Device  
Data processing method and related devices for determining the result of a first type of operation involving an operand in an electronic entity comprising a non-volatile storage unit, includes the...
US20090180610 DECRYPTION METHOD  
The invention relates to a method of determining a plaintext M on the basis of a cipher C and using a secret key d, wherein the secret key d is used in binary form, wherein the plaintext M is...
US20090279691 SECURE DISTRIBUTION OF DATA OR CONTENT USING KEYLESS TRANSFORMATION  
A computer enabled method and apparatus for encrypting and decrypting data using a keyless transformation cryptographic technique. Data is protected using a keyless (unkeyed) complex mathematical...
US20100011047 Hardware-Based Cryptographic Accelerator  
A system, method, and apparatus for performing hardware-based cryptographic operations are disclosed. The apparatus can include an encryption device with a hardware accelerator having an...
US20050044365 Method of protecting digest authentication and key agreement (AKA) against man-in-the-middle (MITM) attack  
Disclosed is a method and system to discourage a MITM attacker in a data communications system that includes client and a server. The method includes, in a Digest Authentication and Key Agreement...
US20100054460 PROTECTION OF A CIPHERING ALGORITHM  
A method for protecting the execution of a ciphering or deciphering algorithm against the introduction of a disturbance in a step implementing one or several first values obtained from second...
US20100057823 Alternate galois field advanced encryption standard round  
An apparatus having a first circuit and a second circuit is disclosed. The first circuit may be configured to (i) generate second Galois Field elements by performing a first Galois Field inversion...
US20100220858 CORRELATION-BASED SYSTEM FOR WATERMARKING CONTINUOUS DIGITAL MEDIA  
A correlation-based system for watermarking continuous digital media at the system application level. It is a post-compression process for watermarking where no a priori knowledge of the...
US20090220078 ON-THE-FLY ENCRYPTION ON A GAMING MACHINE  
Systems, apparatus and methods for on-the-fly encryption of data storage on a computerized wagering gaming machine are described herein. In some embodiments, a method includes accessing, using an...
US20100177888 WARERMARKING AND ENCRYPTION OF ENTROPY-CODED DATA USING ADDITIVE HUFFMAN TABLE  
A secure forensic watermarking system is disclosed that distributes the same encrypted content to all users. The decryption key is different for each user, so that the decrypted content differs...
US20100202609 SECURING MULTIFACTOR SPLIT KEY ASYMMETRIC CRYPTO KEYS  
Techniques for securing an asymmetric crypto-key having a public key and a split private key with multiple private portions are provided. A first one of multiple factors is stored. All of the...
US20100082992 Cryptographic Applications of Efficiently Evaluating Large Degree Isogenies  
Techniques are disclosed for representing and evaluating large prime degree isogenies for use in cryptographic signature and encryption schemes. An isogeny of prime degree 1 may be represented as...
US20130170638 SYSTEM FOR CHECKING ACCEPTANCE OF STRING BY AUTOMATON  
A server having an automaton whose state transitions in accordance with received characters, determines whether the automaton has transitioned to a final state on the basis of the characters. The...
US20080069338 METHODS AND SYSTEMS FOR VERIFYING A LOCATION FACTOR ASSOCIATED WITH A TOKEN  
A server, method and/or computer-readable medium verifies a location factor associated with a token. The server generates a challenge and encrypts the challenge by a key commonly shared by the...
US20080130869 Method to Secure an Electronic Assembly Against Attacks by Error Introduction  
The invention concerns a method to secure an electronic assembly implementing any algorithm against attacks by error introduction. The method according to the invention consists in performing an...
US20090304180 KEY EVOLUTION METHOD AND SYSTEM OF BLOCK CIPHERING  
A system and associated method for block ciphering. The method generates a key that is specific to a text block being encrypted and later being decrypted. The text block is encrypted by a block...
US20080170691 Encryption And Decryption Device In Wireless Portable Internet System,And Method Thereof  
The present invention relates to encryption and decryption apparatuses in a wireless portable Internet system, and a method thereof. In the wireless portable Internet system, a subscriber station...
US20130170645 ENCRYPTION AND DECRYPTION DEVICES AND METHODS THEREOF  
Encryption and decryption devices, computer readable media, and methods thereof. The decryption device comprises a key generator and a decryption module. The key generator is capable of receiving...
US20100310066 APPARATUS AND A METHOD FOR CALCULATING A MULTIPLE OF A POINT AN ELLIPTIC CURVE  
A device and a method for calculating a multiple of a point on an elliptic curve from the right to the left by repeated point doubling and point addition. Each point doubling is evaluated with an...
US20090279692 FAST COMPUTATION OF ONE-WAY HASH SEQUENCES  
Some embodiments of the present invention provide a system that computes a target secret St in a sequence of secrets S0 . . . Sn. During operation, the system obtains k hash functions h1, . . . ,...
US20080025497 Multiple key encryption with "Red Herrings"  
An encryption and communication system and computer which creates a message having both true encrypted characters with false (Red Herring) characters intermixed therewith. In one embodiment, a...
US20140344579 Accelerated Verification of Digital Signatures and Public Keys  
Accelerated computation of combinations of group operations in a finite field is provided by arranging for at least one of the operands to have a relatively small bit length. In a elliptic curve...
US20080025500 CRYPTOGRAPHIC DEVICE HAVING TAMPER RESISTANCE TO POWER ANALYSIS ATTACK  
A randomly selected point on an elliptic curve is set as the initial value of a variable and calculation including a random point value is performed in an algorithm for calculating arbitrary...
US20090060175 Embedding a secret in a bit string for safeguarding the secret  
A method and system for embedding a secret in a bit string for safeguarding the secret. In one embodiment, the method comprises computing the length of the overall bit string as a function of q...
US20150063561 PROTECTION OF A CALCULATION AGAINST SIDE-CHANNEL ATTACKS  
A method for protecting a ciphering algorithm executing looped operations on bits of a first quantity and on a first variable initialized by a second quantity, wherein, for each bit of the first...
US20080189346 METHOD FOR REALIZING FINITE FIELD DIVIDER ARCHITECTURE  
A method for realizing a finite field divider architecture is proposed, in which all standard basis of a divider are transformed into the composite field basis, and the circuit is realized using...
US20090268913 TIMING ADJUSTMENT FOR SESSION SECURITY PROTOCOL  
According to certain embodiments of the present invention, cryptosynchronization values are calculated on an initiating and/or responding device in a communications system such that...
US20130142327 ANTI-SPYING ENCRYPTED KEYBOARD  
Disclosed is an anti-spying encrypted keyboard, particularly an anti-spying encrypted keyboard having an anti-spying detection protective system in multiple aspects. The anti-spying encrypted...
US20100020965 METHOD FOR SPEEDING UP THE COMPUTATIONS FOR CHARACTERISTIC 2 ELLIPTIC CURVE CRYPTOGRAPHIC SYSTEMS  
In some embodiments, an apparatus and method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems are described. In one embodiment, a multiplication routine...
US20150200775 SYSTEM AND METHOD FOR CRYPTOGRAPHIC KEY IDENTIFICATION  
A method for determining a cyrptographic key for a MEMS device includes identifying physical properties for the device. A feature vector having a plurality of values is determined. Each of the...
US20090225981 Document processing and management approach to adding an exclusive plugin implementing a desired functionality  
A method of adding a plug-in to a system, the method comprising sending a login request to a client. The login request is sent to an exclusive plug-in by the client. The exclusive plug-in, sends...
US20150117639 SECURE AND PRIVACY FRIENDLY DATA ENCRYPTION  
In one aspect, the present disclosure provide an encryption circuit that performs a method for establishing a secure communication channel. In this regard, the method includes receiving a public...
US20080137838 PORTABLE STORAGE DEVICE AND SYSTEM WITH HARDWARE KEY AND COPYRIGHT MANAGEMENT FUNCTION  
A portable storage device and system with hardware key and copyright management function is disclosed, which comprises an encryption and copyright setting software and a portable storage device....
US20140321639 APPARATUS AND METHOD TO PREVENT SIDE CHANNEL POWER ATTACKS IN ADVANCED ENCRYPTION STANDARD USING FLOATING POINT OPERATION  
Apparatus and method for obscuring round 1 power consumption of hardware implementation of the AES algorithm. By simultaneously executing a processor floating point operation while executing round...
US20100278333 METHOD AND APPARATUS FOR PERFORMING ELLIPTIC CURVE ARITHMETIC  
A method of performing a cryptographic operation on a point in an elliptic curve cryptosystem using an elliptic curve. The method comprises the steps of obtaining information that uniquely...
US20080273697 Use of Indirect Data Keys for Encrypted Tape Cartridges  
A method, system and program are provided for enabling selective access to multiple users' encrypted data in a single storage cartridge. A unique, derived key is generated for each user's data by...
US20150061826 APPARATUS AND METHODS FOR IDENTITY VERIFICATION  
An identity verification device comprises a cellular telecommunications modem and a fingerprint scanner coupled to the modem, the verification device being configured for storing first fingerprint...