Match Document Document Title
US20090323959 Method for producing two-dimensional code reader for reading the two-dimensional code  
A method of producing a two-dimensional code having a code area in which data codes coded as codewords are mapped. First type of data codes is mapped in the code area. The first type of data codes...
US20070133798 Quantum cryptography on a multi-drop optical network  
A system includes an optical network unit and a head-end or central office connected to a multi-drop optical network. The optical network unit transmits dim optical pulses via the multi-drop...
US20120328093 PROCESSING CONTEXT INFORMATION  
A method and system for generating contexts of targets to estimate a high-order context. The system includes: a detection device including: a sensor for detecting a target; module for extracting...
US20090316885 NATURAL LANGUAGE DEPENDENT STREAM CIPHERS  
A natural language dependent stream cipher is provided to increase complexity of stream cipher encryption. In one aspect, a message is received from a sender as an input in a first natural...
US20080219435 Information transmitting apparatus, information transmitting method, and computer product  
An information transmitting apparatus encrypts and transmits transmit data that includes contents for which transmission instruction has been received, an authentication code, and padding. The...
US20110255688 METHOD AND SYSTEM FOR MONITORING ONLINE COMPUTER NETWORK BEHAVIOR AND CREATING ONLINE BEHAVIOR PROFILES  
A method and system for monitoring users on one or more computer networks, disassociating personally identifiable information from the collected data, and storing it in a database so that the...
US20120128150 PATTERN-FREE ENCRYPTION  
A method is described for defining a reserved pattern of symbols, receiving in a crypto-module an input stream including sequential input symbols, applying a cipher to the input stream in the...
US20100177887 MONTGOMERY-BASED MODULAR EXPONENTIATION SECURED AGAINST HIDDEN CHANNEL ATTACKS  
The invention relates to a cryptographic method that incorporates a modular exponentiation secured against hidden channel attacks, without requiring knowledge of the public exponent. The method...
US20080130889 Multi-data rate cryptography architecture for network security  
An architecture and associated methods and devices are described that include a plurality of stages of cipher round logic, each stage configured to perform cryptographic processing of plaintext...
US20090046850 GENERAL DATA HIDING FRAMEWORK USING PARITY FOR MINIMAL SWITCHING  
A framework is provided for reducing the number of locations modified when hiding data, such as a digital watermark, in binary data. The framework complements data hiding techniques, such as...
US20090185676 METHOD TO GENERATE A PRIVATE KEY IN A BONEH-FRANKLIN SCHEME  
The aim of the present invention is to propose an alternative scheme to the classical Boneh-Franklin scheme in order to simplify the generation and the use of the asymmetric keys. According to the...
US20090034717 METHOD OF PROCESSING DATA PROTECTED AGAINST ATTACKS BY GENERATING ERRORS AND ASSOCIATED DEVICE  
A data processing method comprises the following steps: determining a first result data word from a first input data word and a first secret data word;obtaining a first compressed data word from...
US20090220072 Secure serial number generation  
An apparatus and a method for generating serial numbers is described. In one embodiment, a block cipher encrypter encrypts an application identifier and a sequence of random numbers to generate a...
US20090225985 METHOD, APPARATUS AND PRODUCT FOR RFID AUTHENTICATION  
A method and apparatus for repeated communication sessions between a sender (e.g., RFID tag) and a receiver (RFID reader) that employs a proactive information security scheme is based on the...
US20070211896 ENCRYPTION AND DECRYPTION PROGRAMS AND CRYPTOSYSTEM  
An encryption computer program product, in a computer readable medium, including instructions executed by a computer for causing the computer to implement a method of encrypting input data,...
US20100329454 ENCRYPTION PARAMETER SETTING APPARATUS, KEY GENERATION APPARATUS, CRYPTOGRAPHIC SYSTEM, PROGRAM, ENCRYPTION PARAMETER SETTING METHOD, AND KEY GENERATION METHOD  
A sophisticated cryptographic system is realized without using a pairing operation on a composite order. A random matrix selection unit 142 randomly selects a random matrix V* from a plurality of...
US20140241523 Installable Secret Functions for a Peripheral  
There is provided a pluggable secure device identity module (SDIM) attached to a peripheral where the SDIM includes one or more secret functions provided by a third party that are used by the...
US20060198515 Secure disc drive electronics implementation  
A data storage device comprises a storage medium and a controller including a cryptographic and security module for encrypting and decrypting data to be stored in and retrieved from the storage...
US20100054474 SHARING A SECRET USING HYPERPLANES OVER GF(2m)  
A method and system distributes N shares of a secret among cooperating entities using hyperplanes over GF(2m), such that the secret can be reconstructed from K of the N shares (where K≦N). In one...
US20090310778 VARIABLE-LENGTH CIPHER SYSTEM AND METHOD  
Systems and methods for enciphering data are provided. In one embodiment, information is enciphered using a variable block length cipher that returns the encrypted symbol set in the same format as...
US20150016603 DEVICE AND METHOD FOR MANAGING ELECTRONIC FACILITIES OF BUILDINGS  
A device and a method for managing electronic facilities of buildings. The device may include one or more interface elements for connecting the device to one or more electronic facilities of a...
US20120328092 PROCESSING CONTEXT INFORMATION  
A system for generating contexts of targets to estimate a high-order context. The system includes: a detection device including: a sensor for detecting a target; module for extracting the target...
US20090138710 Message Authentication Device, Message Authentication Method, Message Authentication Program and Storage Medium therefor  
A message authentication device, a message authentication method, a message authentication program and a storage medium therefor are provided, so as to realize higher speed processing than an...
US20100158246 METHOD FOR AUTHENTICATION AND ELECTRONIC DEVICE FOR PERFORMING THE AUTHENTICATION  
An authentication method (100) for a secure data transmission is provided, the method comprising performing a first authentication protocol (101) by using a first cipher and performing a second...
US20070110226 TRANSMISSION/RECEPTION SYSTEM, TRANSMISSION/RECEPTION METHOD, RECEIVER DEVICE, RECEPTION METHOD, AND PROGRAM  
The present invention provides a transmission/reception system including a first sender device, a second sender device, and a receiver device. The first device is configured to encrypt stream data...
US20070076863 Device and method for communication with the aid of an encrypted code table  
In order to maintain the required security, an interface specific code is stored in an encrypted manner in a code memory which is integrated in a communication processor. In the event of an error...
US20080025498 MONTGOMERY POWER LADDER ALGORITHM INCLUDING COUNTERMEASURE AGAINST DIFFERENTIAL FAULT ANALYSIS  
A Montgomery power ladder algorithm that provides a countermeasure against a differential fault analysis (DFA) includes an initialization operation and a repetitive arithmetic operation. In the...
US20100067686 SHARED KEY BLOCK CIPHER APPARATUS, ITS METHOD, ITS PROGRAM AND RECORDING MEDIUM  
There is provided a shared key block cipher apparatus, its method, its program, and a recording medium in which a block cipher having a large block size is constructed by combining highly secure...
US20100172491 Computing Isogenies Between Genus-2 Curves for Cryptography  
This cryptographic curve generation technique provides a faster way of constructing a genus 2 curve. The technique provides a procedure to compute isogenies between genus 2 curves over finite...
US20130028411 Simple Group Security for Machine-to-Machine Networking (SGSM2M)  
A group identity for a set of devices is generated by acquiring an identity for each one of the devices and joining the identities into a common identity data set. A group identity for the set of...
US20060002548 Method and system for implementing substitution boxes (S-boxes) for advanced encryption standard (AES)  
Systems and methods for implementing Advanced Encryption Standard (AES) are disclosed herein. Aspects of the method may comprise storing 256 bytes of data. A non-zero byte portion of the 256 bytes...
US20120087491 A METHOD AND A DEVICE FOR PERFORMING TORUS-BASED CRYPTOGRAPHY  
At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. The present invention extends their setting to the ring of integers modulo N, thus...
US20060023875 Enhanced stream cipher combining function  
A cryptographic system and method includes generating a plurality of round keys from blocks of a key stream; and performing a combining function. When encrypting a set of blocks of plaintext data...
US20110013770 ENCRYPTING METHOD HAVING COUNTERMEASURE FUNCTION AGAINST POWER ANALYZING ATTACKS  
Based on an encrypting method for performing an exponential remainder calculation y=ad (mod n) from an u-bit exponent d=(du−1, . . . , d0)2, input data a, and a modulo n, calculating a′=a2(mod n)...
US20100002875 Slice-Based Prioritized Secure Video Streaming  
Slice-based prioritized secure video streaming comprises a transmitter receiving a slice comprising a plurality of macroblocks and selecting an encryption key based at least in part on a relative...
US20090046849 Data integrity and non-repudiation method  
A method is disclosed for establishing data integrity and non-repudiation without hashing and without performing a bit to bit comparison of the message. The method includes: generating a random...
US20080019503 Encryption protection method  
A deterministic blinding method for cipher algorithms that employ key-mixing and substitution (S-box) operations uses a masking table constructed with a true mask and a plurality of dummy masks...
US20090116645 FILE SHARING METHOD AND SYSTEM USING ENCRYPTION AND DECRYPTION  
Disclosed is a file sharing method and system using encryption and decryption. A client hashes keywords related to files using a symmetric key algorithm, and encodes the hashed keywords. Then, the...
US20090094464 SIGNATURE GENERATING DEVICE, SIGNATURE GENERATING METHOD AND SIGNATURE GENERATING PROGRAM  
A signature generation apparatus is capable of making a value used in signature generation processing difficult to analyze. In the signature generation apparatus, a random number generation module...
US20080181397 SECURE DATA TRANSMISSION AND STORAGE USING LIMITED-DOMAIN FUNCTIONS  
An encryption system and method using a set of reversible functions that iteratively reduce the message to be encrypted. In an exemplary embodiment, an encryption module can first receive a data...
US20090279687 CRYPTOGRAPHIC OPERATION PROCESSING CIRCUIT  
A dummy operation instruction circuit (100) is provided for issuing a dummy operation instruction (113) to a cryptographic control circuit (101) instead of a CPU (109) or the like after being...
US20090245514 FORENSIC DECRYPTION TOOLS  
Providing authorized copies of encrypted media content including: receiving application for authentication to make copies of the media content; providing forensic decryption tools to process the...
US20090304179 SYSTEM AND METHOD TO PRECLUDE MESSAGE MODIFICATION IN DATA AUTHENTICATION SYSTEMS THROUGH EFFICENT USE OF FEEDBACK IN CRYPTOGRAPHIC FUNCTIONS  
A data hashing system operative to hash an incoming string of message words, thereby to generate a hash value tag comprising a deterministic random number string which uniquely identifies the...
US20080130895 Method and System for Deploying Advanced Cryptographic Algorithms  
A method and system for deploying a suite of advanced cryptographic algorithms that includes: providing a legacy cryptographic interface that is associated with a legacy operating system and a...
US20100098255 SYSTEM AND METHOD FOR A DERIVATION FUNCTION FOR KEY PER PAGE  
Disclosed herein are systems, methods and computer-readable media to perform data encryption and decryption using a derivation function to obtain a key per page of data in a white-box environment....
US20080199007 Identification of a compromised content player  
A system and method for identifying the player that leaked content encryption keys by loading a set of player keys into individual content players and determining the number of encryptions and the...
US20090279693 METHOD AND A DEVICE FOR GENERATING A PSEUDORANDOM STRING  
The invention relates to a method of generating a pseudorandom string of terms belonging to a finite body K of cardinal q≧2 intended to be used in a cryptography procedure, said method comprising...
US20060177056 Secure seed generation protocol  
Techniques for secure generation of a seed for use in performing one or more cryptographic operations, utilizing a seed generation protocol carried out by a seed generation client (110c) and a...
US20150124960 BLACK CORE NETWORK SYSTEM AND METHOD  
In a network having an encryptor device having an encryption module, a plaintext interface and a ciphertext interface, wherein the encryption module encrypts data transferred from the plaintext...
US20050084097 APPARATUS AND METHOD FOR CALCULATINGTKIP SBOX VALUE  
An input port for receiving the 16-bit index value is connected to a plurality of combinatorial logic. The plurality of combinatorial logic directly calculates the TKIP Sbox value based on the...