Match Document Document Title
US20090136023 Data Encryption Method Using Discrete Fractional Hadamard Transformation  
A data encryption method using discrete fractional Hadamard transformation includes the steps of: providing a set of data; processing the data with discrete fractional Hadamard transformation to...
US20090097637 RANDOMIZED RSA-BASED CRYPTOGRAPHIC EXPONENTIATION RESISTANT TO SIDE CHANNEL AND FAULT ATTACKS  
Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates data encryption, data decryption, and/or generation of digital...
US20080170702 METHOD FOR PERFORMING HANDOVER BETWEEN COMMUNICATION SYSTEMS  
A method for determining an encryption algorithm includes: determining whether an encryption algorithm of a target communication system is received when a handover is initiated by a user terminal;...
US20070211890 Table splitting for cryptographic processes  
For a defined cryptographic process including an original substitution table, split masked substitution tables are provided to resist cryptographic attacks. The split masked substitution tables...
US20080181405 Anonymous telecommunication traffic measurement data associated user identifications  
The invention allows anonymization of user identifications associated with telecommunication traffic measurement data that is fast, secure, and easy to use with distributed traffic measurements....
US20100183142 Encryption Processing Apparatus, Encryption Processing Method, and Computer Program  
An apparatus and method for performing a high-speed operation in a hyperelliptic curve cryptography process are provided. If a standard divisor having a weight equal to a genus g in the...
US20090265560 Numbering Method, Numbering Device, and Laser Direct Drawing Apparatus  
An object is to give an identification number which is hard to guess from the previous and next identification numbers without overlap, to give an identification number by using a simple program,...
US20050182946 Fast hashing function for pseudo-random generator  
A method and computer device for generating a pseudo-random value string of N characters for an authentication token. The method partitions a message digest into at least one segment, each segment...
US20100104098 CRYPTOGRAPHIC METHOD AND DEVICE FOR SCHEDULING AND COMPRESSING MESSAGE BASED ON SECURE HASH ALGORITHM  
The present invention relates to a secure hash algorithm (SHA)-based message schedule operation method, a message compression operation method, and a cryptographic device performing the same. The...
US20110261954 Diffusion Oriented Method and Apparatus for Stream Cryptography  
The present invention applies with a diffused mechanism, as such, a variable series of diffusion functions embedded within a diffusion-medium, to generate a maximum diffusion-cycle and nonlinear...
US20060023878 Modular multipliers having segmentable structure and cryptography systems utilizing same  
A segmentable modular multiplier circuit includes a control circuit configured to produce a mode control signal and operation control signals in response to a control signal and a calculator...
US20090141887 METHOD AND APPARATUS FOR GENERIC MULTI-STAGE NESTED HASH PROCESSING  
A generic multi-stage nested hash unit that provides support for generic, multi-stage nested hashes accelerates a wide range of security algorithms and protocols. The supported security algorithms...
US20080130872 MULTIMODE BLOCK CIPHER ARCHITECTURES  
An architecture for a block cipher, where the architecture includes functional units that are logically reconfigurable so as to be able to both encrypt clear text into cipher text and decrypt...
US20060233357 Encrypting apparatus and encrypting method  
To propose an encryption device and encryption method capable of improving reliability of an encryption function. An element-specific parameter unique to a solid imaging element is created based...
US20060245587 System and method for private information matching  
A system and method for confidentially matching information among parties are disclosed. Briefly described, one embodiment is a method comprising receiving from a first party a list of items,...
US20070140478 Encryption apparatus and encryption method  
An encryption apparatus for generating a ciphertext block from a plaintext block is disclosed. A selector selects at random one mask random number from a plurality of random numbers generated by a...
US20060013388 Method and system for implementing FI function in KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets  
In a wireless communication system, a method and system for implementing an FI function in a KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets are provided. An...
US20100037069 Integrated Cryptographic Security Module for a Network Node  
A system that provides a cryptographic unit that generates secret keys that are not directly accessible to software executed by a controller. The cryptographic unit can include a restrictor...
US20090103714 Encryption device, encryption method, and computer program  
The invention realizes a high-security cryptographic processing apparatus that increases difficulty in analyzing its key and a method therefor. In Feistel-type common-key-block cryptographic...
US20070053506 Elliptic curve encryption processor, processing method of the processor using elliptic curves, and program for causing a computer to execute point scalar multiplication on elliptic curves  
An object is to make a conventional GLV scalar multiplication applicable to a wider range of elliptic curves. An elliptic curve encryption processor includes an input section 2 that inputs...
US20140348323 PROTECTING AGAINST WHITE BOX ATTACKS USING COLUMN ROTATION  
Various embodiments of a computer-implemented method of information security using block cipher column rotations are described. The cipher state column rotations provide resistance to white box...
US20090122978 METHOD AND SYSTEM FOR OBFUSCATING A CRYPTOGRAPHIC FUNCTION  
In a system 300, a server 310 provides a cryptographic function F to an execution device in an obfuscated form. The function F composes output of a plurality of the mapping tables Ti(0≦i≦n; n≧1)...
US20080019507 Method for Protecting IC Cards Against Power Analysis Attacks  
A method for protecting data against power analysis attacks includes at least a first phase of executing a cryptographic operation for ciphering data in corresponding enciphered data through a...
US20100098243 METHOD OF OPERATING AN ITEM OF ON-BOARD EQUIPMENT, ASSOCIATED EQUIPMENT AND AIRCRAFT COMPRISING SUCH EQUIPMENT  
The present invention relates to equipment items (10) installed on board vehicles (50) and more particularly to a method for operating such an on-board equipment item (10) which method comprising...
US20080069344 METHOD AND APPARATUS FOR KEY AGREEMENT BETWEEN DEVICES USING POLYNOMIAL RING  
Provided is a method of key agreement between devices. Using the method, two devices on a network can exchange information using polynomials of a polynomial ring, authenticate each other using the...
US20060034455 Permutation data transform to enhance security  
A data input is divided into two segments; the second segment is also divided into groups. Bits in the first segment are used to control the application of permutation functions to bit groups in...
US20150071432 PHYSICALLY UNCLONABLE FUNCTION BASED ON RESISTIVITY OF MAGNETORESISTIVE RANDOM-ACCESS MEMORY MAGNETIC TUNNEL JUNCTIONS  
One feature pertains to least one physically unclonable function based on an array of magnetoresistive random-access memory (MRAM) cells. A challenge to the array of MRAM cells may identify some...
US20070071233 Hash function using arbitrary numbers  
A hash unit, including an input interface adapted to receive an input key, an arbitrary number generator adapted to generate one or more arbitrary numbers, a processor adapted to apply a...
US20060133603 Integer division method which is secure against covert channel attacks  
The invention relates to a cryptographic method involving an integer division of type q=a div b and r=a mod b, wherein a is a number of m bits, b is a number of n bits, with n being less than or...
US20090257593 METHOD AND APPARATUS FOR SECURE MESSAGING  
A network-based method for secure messaging is performed by: receiving a message sent by a sender to a recipient with a store-and-forward protocol, at a network location. The received message is...
US20090003591 Quantum Cryptographic Communication Method  
A sender (1) adds decoy photons to a secret photon having confidential information, then, subjects each photon to a different rotational manipulation, and passes the photons along a quantum...
US20120045056 CRYPTOGRAPHIC PROCESSING SYSTEM  
It is aimed to implement a hierarchical predicate encryption (HPE) scheme. A cryptographic process is performed using dual vector spaces (dual distortion vector spaces (DDVS)) of a space V and a...
US20090010425 ENCRYPTION/DECRYPTION DEVICE, ENCRYPTION/DECRYPTION DEVICE MANUFACTURING DEVICE, AND METHOD, AND COMPUTER PROGRAM  
A Feistel type common key block cipher process configuration capable of maintaining the involution property and safety and easily changing the number of rounds is realized. The Feistel type cipher...
US20090138704 Cryptographic method with integrated encryption and revocation, system, device and programs for implementing this method  
A first entity (1) includes a secret encryption key (g1, γ) of an encryption diagram which can accept a plurality of encryption keys. A plurality of decoders have respective encryption keys, each...
US20070206784 Ring arithmetic method, system, and apparatus  
A data encryption method performed with ring arithmetic operations using a residue number multiplication process wherein a first conversion to a first basis is done using a mixed radix system and...
US20090022310 CRYPTOGRAPHIC DEVICE AND METHOD FOR GENERATING PSEUDO-RANDOM NUMBERS  
A cryptographic device and a cryptographic method of generating pseudo-random numbers. Initial data is divided into a plurality of words on b bits defined in a finite body GF(2b). The words are...
US20090220071 COMBINING INSTRUCTIONS INCLUDING AN INSTRUCTION THAT PERFORMS A SEQUENCE OF TRANSFORMATIONS TO ISOLATE ONE TRANSFORMATION  
The Advanced Encryption Standard (AES) is a symmetric block cipher that can encrypt and decrypt information. Encryption (cipher) performs a series of transformations (Shift Rows, Substitute Bytes,...
US20100111292 AGGREGATE AND PARALLELIZABLE HASH FUNCTION  
A hash provides aggregation properties, and allows distributed and/or concurrent processing. In an example, the hash operates on message M, and produces a multiplicative matrix sequence by...
US20120121082 PRIVACY REGION MASKING DEVICE AND METHOD IN VEHICLE BLACK BOX  
A privacy region-masking device of an automobile black box system includes a masking region configuration module for constructing a masking region on an internal image of a vehicle and a key...
US20080181403 AUTHENTICATING SYSTEM, AUTHENTICATING METHOD, AND AUTHENTICATING PROGRAM  
The present invention is an authenticating system including: a client (hereinafter, referred to as C) including a creator for, by employing a first hash algorithm (hereinafter, referred to as 1A),...
US20150071430 PHYSICALLY UNCLONABLE FUNCTION BASED ON THE INITIAL LOGICAL STATE OF MAGNETORESISTIVE RANDOM-ACCESS MEMORY  
One feature pertains to a method for implementing a physically unclonable function (PUF). The method includes providing an array of magnetoresistive random access memory (MRAM) cells, where the...
US20110216902 Computation of garbled tables in garbled circuit  
An efficient encryption system for improving the computation speed of a garbled circuit is set forth. The garbled circuit includes a number of garbled Boolean gates having first and second garbled...
US20100322413 ELECTRONIC DEVICE, CONTENT REPRODUCTION CONTROL METHOD, PROGRAM, STORAGE MEDIUM, AND INTEGRATED CIRCUIT  
To play back a content while managing the right of use of the content, such as a total time of playback of the content, an electronic device stores right information in a right temporary storage...
US20080273693 EFFICIENT ENCODING PROCESSES AND APPARATUS  
A method for encoding video includes receiving data, and encrypting the data using at least four Huffman trees. A method for encoding video includes receiving data, and encrypting the data such...
US20110142226 METHOD OF GENERATING PSEUDO-RANDOM BIT STRINGS  
Method for generating pseudo-random bit strings in a system in which the data interchanges between a first user and a second user are protected, characterized in that it comprises at least the...
US20140119537 APPARATUS AND METHOD FOR THE DETECTION OF ATTACKS TAKING CONTROL OF THE SINGLE PHOTON DETECTORS OF A QUANTUM CRYPTOGRAPHY APPARATUS BY RANDOMLY CHANGING THEIR EFFICIENCY  
An apparatus and method for revealing both attack attempts performed on the single-photon detector(s) of a quantum cryptography system and Trojan horse attack attempts performed on quantum...
US20100172494 ENCRYPTING A PLAINTEXT MESSAGE WITH AUTHENTICAION  
An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present...
US20080170685 Data scrambling circuit  
A data scrambling circuit is provided. The data scrambling circuit includes an integrated circuit having a digital logic device and an interface circuit coupled to the digital logic device. Also...
US20090010431 METHOD FOR THE RAPID SYNCHRONISATION OF A DEVICE FOR RECEIVING SCRAMBLED DATA, USING AN OPTIMISED CALCULATION OF A SYNCHRONISATION VALUE  
The disclosure relates to a method of synchronising a device for receiving scrambled data, using at least one periodic scrambling sequence which is divided into K time intervals, each interval...
US20070195949 Encryption processing method and encryption processing device  
An increase in safety from attacks by use of hardware-like methods by small-sized hardware is achieved. An encryption processing device includes a logical circuit capable of programmably setting...