Match

Document 
Document Title 

US20090136023 
Data Encryption Method Using Discrete Fractional Hadamard Transformation
A data encryption method using discrete fractional Hadamard transformation includes the steps of: providing a set of data; processing the data with discrete fractional Hadamard transformation to... 

US20090097637 
RANDOMIZED RSABASED CRYPTOGRAPHIC EXPONENTIATION RESISTANT TO SIDE CHANNEL AND FAULT ATTACKS
Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates data encryption, data decryption, and/or generation of digital... 

US20080170702 
METHOD FOR PERFORMING HANDOVER BETWEEN COMMUNICATION SYSTEMS
A method for determining an encryption algorithm includes: determining whether an encryption algorithm of a target communication system is received when a handover is initiated by a user terminal;... 

US20070211890 
Table splitting for cryptographic processes
For a defined cryptographic process including an original substitution table, split masked substitution tables are provided to resist cryptographic attacks. The split masked substitution tables... 

US20080181405 
Anonymous telecommunication traffic measurement data associated user identifications
The invention allows anonymization of user identifications associated with telecommunication traffic measurement data that is fast, secure, and easy to use with distributed traffic measurements.... 

US20100183142 
Encryption Processing Apparatus, Encryption Processing Method, and Computer Program
An apparatus and method for performing a highspeed operation in a hyperelliptic curve cryptography process are provided. If a standard divisor having a weight equal to a genus g in the... 

US20090265560 
Numbering Method, Numbering Device, and Laser Direct Drawing Apparatus
An object is to give an identification number which is hard to guess from the previous and next identification numbers without overlap, to give an identification number by using a simple program,... 

US20050182946 
Fast hashing function for pseudorandom generator
A method and computer device for generating a pseudorandom value string of N characters for an authentication token. The method partitions a message digest into at least one segment, each segment... 

US20100104098 
CRYPTOGRAPHIC METHOD AND DEVICE FOR SCHEDULING AND COMPRESSING MESSAGE BASED ON SECURE HASH ALGORITHM
The present invention relates to a secure hash algorithm (SHA)based message schedule operation method, a message compression operation method, and a cryptographic device performing the same. The... 

US20110261954 
Diffusion Oriented Method and Apparatus for Stream Cryptography
The present invention applies with a diffused mechanism, as such, a variable series of diffusion functions embedded within a diffusionmedium, to generate a maximum diffusioncycle and nonlinear... 

US20060023878 
Modular multipliers having segmentable structure and cryptography systems utilizing same
A segmentable modular multiplier circuit includes a control circuit configured to produce a mode control signal and operation control signals in response to a control signal and a calculator... 

US20090141887 
METHOD AND APPARATUS FOR GENERIC MULTISTAGE NESTED HASH PROCESSING
A generic multistage nested hash unit that provides support for generic, multistage nested hashes accelerates a wide range of security algorithms and protocols. The supported security algorithms... 

US20080130872 
MULTIMODE BLOCK CIPHER ARCHITECTURES
An architecture for a block cipher, where the architecture includes functional units that are logically reconfigurable so as to be able to both encrypt clear text into cipher text and decrypt... 

US20060233357 
Encrypting apparatus and encrypting method
To propose an encryption device and encryption method capable of improving reliability of an encryption function. An elementspecific parameter unique to a solid imaging element is created based... 

US20060245587 
System and method for private information matching
A system and method for confidentially matching information among parties are disclosed. Briefly described, one embodiment is a method comprising receiving from a first party a list of items,... 

US20070140478 
Encryption apparatus and encryption method
An encryption apparatus for generating a ciphertext block from a plaintext block is disclosed. A selector selects at random one mask random number from a plurality of random numbers generated by a... 

US20060013388 
Method and system for implementing FI function in KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets
In a wireless communication system, a method and system for implementing an FI function in a KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets are provided. An... 

US20100037069 
Integrated Cryptographic Security Module for a Network Node
A system that provides a cryptographic unit that generates secret keys that are not directly accessible to software executed by a controller. The cryptographic unit can include a restrictor... 

US20090103714 
Encryption device, encryption method, and computer program
The invention realizes a highsecurity cryptographic processing apparatus that increases difficulty in analyzing its key and a method therefor. In Feisteltype commonkeyblock cryptographic... 

US20070053506 
Elliptic curve encryption processor, processing method of the processor using elliptic curves, and program for causing a computer to execute point scalar multiplication on elliptic curves
An object is to make a conventional GLV scalar multiplication applicable to a wider range of elliptic curves. An elliptic curve encryption processor includes an input section 2 that inputs... 

US20140348323 
PROTECTING AGAINST WHITE BOX ATTACKS USING COLUMN ROTATION
Various embodiments of a computerimplemented method of information security using block cipher column rotations are described. The cipher state column rotations provide resistance to white box... 

US20090122978 
METHOD AND SYSTEM FOR OBFUSCATING A CRYPTOGRAPHIC FUNCTION
In a system 300, a server 310 provides a cryptographic function F to an execution device in an obfuscated form. The function F composes output of a plurality of the mapping tables Ti(0≦i≦n; n≧1)... 

US20080019507 
Method for Protecting IC Cards Against Power Analysis Attacks
A method for protecting data against power analysis attacks includes at least a first phase of executing a cryptographic operation for ciphering data in corresponding enciphered data through a... 

US20100098243 
METHOD OF OPERATING AN ITEM OF ONBOARD EQUIPMENT, ASSOCIATED EQUIPMENT AND AIRCRAFT COMPRISING SUCH EQUIPMENT
The present invention relates to equipment items (10) installed on board vehicles (50) and more particularly to a method for operating such an onboard equipment item (10) which method comprising... 

US20080069344 
METHOD AND APPARATUS FOR KEY AGREEMENT BETWEEN DEVICES USING POLYNOMIAL RING
Provided is a method of key agreement between devices. Using the method, two devices on a network can exchange information using polynomials of a polynomial ring, authenticate each other using the... 

US20060034455 
Permutation data transform to enhance security
A data input is divided into two segments; the second segment is also divided into groups. Bits in the first segment are used to control the application of permutation functions to bit groups in... 

US20150071432 
PHYSICALLY UNCLONABLE FUNCTION BASED ON RESISTIVITY OF MAGNETORESISTIVE RANDOMACCESS MEMORY MAGNETIC TUNNEL JUNCTIONS
One feature pertains to least one physically unclonable function based on an array of magnetoresistive randomaccess memory (MRAM) cells. A challenge to the array of MRAM cells may identify some... 

US20070071233 
Hash function using arbitrary numbers
A hash unit, including an input interface adapted to receive an input key, an arbitrary number generator adapted to generate one or more arbitrary numbers, a processor adapted to apply a... 

US20060133603 
Integer division method which is secure against covert channel attacks
The invention relates to a cryptographic method involving an integer division of type q=a div b and r=a mod b, wherein a is a number of m bits, b is a number of n bits, with n being less than or... 

US20090257593 
METHOD AND APPARATUS FOR SECURE MESSAGING
A networkbased method for secure messaging is performed by: receiving a message sent by a sender to a recipient with a storeandforward protocol, at a network location. The received message is... 

US20090003591 
Quantum Cryptographic Communication Method
A sender (1) adds decoy photons to a secret photon having confidential information, then, subjects each photon to a different rotational manipulation, and passes the photons along a quantum... 

US20120045056 
CRYPTOGRAPHIC PROCESSING SYSTEM
It is aimed to implement a hierarchical predicate encryption (HPE) scheme. A cryptographic process is performed using dual vector spaces (dual distortion vector spaces (DDVS)) of a space V and a... 

US20090010425 
ENCRYPTION/DECRYPTION DEVICE, ENCRYPTION/DECRYPTION DEVICE MANUFACTURING DEVICE, AND METHOD, AND COMPUTER PROGRAM
A Feistel type common key block cipher process configuration capable of maintaining the involution property and safety and easily changing the number of rounds is realized. The Feistel type cipher... 

US20090138704 
Cryptographic method with integrated encryption and revocation, system, device and programs for implementing this method
A first entity (1) includes a secret encryption key (g1, γ) of an encryption diagram which can accept a plurality of encryption keys. A plurality of decoders have respective encryption keys, each... 

US20070206784 
Ring arithmetic method, system, and apparatus
A data encryption method performed with ring arithmetic operations using a residue number multiplication process wherein a first conversion to a first basis is done using a mixed radix system and... 

US20090022310 
CRYPTOGRAPHIC DEVICE AND METHOD FOR GENERATING PSEUDORANDOM NUMBERS
A cryptographic device and a cryptographic method of generating pseudorandom numbers. Initial data is divided into a plurality of words on b bits defined in a finite body GF(2b). The words are... 

US20090220071 
COMBINING INSTRUCTIONS INCLUDING AN INSTRUCTION THAT PERFORMS A SEQUENCE OF TRANSFORMATIONS TO ISOLATE ONE TRANSFORMATION
The Advanced Encryption Standard (AES) is a symmetric block cipher that can encrypt and decrypt information. Encryption (cipher) performs a series of transformations (Shift Rows, Substitute Bytes,... 

US20100111292 
AGGREGATE AND PARALLELIZABLE HASH FUNCTION
A hash provides aggregation properties, and allows distributed and/or concurrent processing. In an example, the hash operates on message M, and produces a multiplicative matrix sequence by... 

US20120121082 
PRIVACY REGION MASKING DEVICE AND METHOD IN VEHICLE BLACK BOX
A privacy regionmasking device of an automobile black box system includes a masking region configuration module for constructing a masking region on an internal image of a vehicle and a key... 

US20080181403 
AUTHENTICATING SYSTEM, AUTHENTICATING METHOD, AND AUTHENTICATING PROGRAM
The present invention is an authenticating system including: a client (hereinafter, referred to as C) including a creator for, by employing a first hash algorithm (hereinafter, referred to as 1A),... 

US20150071430 
PHYSICALLY UNCLONABLE FUNCTION BASED ON THE INITIAL LOGICAL STATE OF MAGNETORESISTIVE RANDOMACCESS MEMORY
One feature pertains to a method for implementing a physically unclonable function (PUF). The method includes providing an array of magnetoresistive random access memory (MRAM) cells, where the... 

US20110216902 
Computation of garbled tables in garbled circuit
An efficient encryption system for improving the computation speed of a garbled circuit is set forth. The garbled circuit includes a number of garbled Boolean gates having first and second garbled... 

US20100322413 
ELECTRONIC DEVICE, CONTENT REPRODUCTION CONTROL METHOD, PROGRAM, STORAGE MEDIUM, AND INTEGRATED CIRCUIT
To play back a content while managing the right of use of the content, such as a total time of playback of the content, an electronic device stores right information in a right temporary storage... 

US20080273693 
EFFICIENT ENCODING PROCESSES AND APPARATUS
A method for encoding video includes receiving data, and encrypting the data using at least four Huffman trees. A method for encoding video includes receiving data, and encrypting the data such... 

US20110142226 
METHOD OF GENERATING PSEUDORANDOM BIT STRINGS
Method for generating pseudorandom bit strings in a system in which the data interchanges between a first user and a second user are protected, characterized in that it comprises at least the... 

US20140119537 
APPARATUS AND METHOD FOR THE DETECTION OF ATTACKS TAKING CONTROL OF THE SINGLE PHOTON DETECTORS OF A QUANTUM CRYPTOGRAPHY APPARATUS BY RANDOMLY CHANGING THEIR EFFICIENCY
An apparatus and method for revealing both attack attempts performed on the singlephoton detector(s) of a quantum cryptography system and Trojan horse attack attempts performed on quantum... 

US20100172494 
ENCRYPTING A PLAINTEXT MESSAGE WITH AUTHENTICAION
An encryption and authentication technique that achieves enhanced integrity verification through assured errorpropagation using a multistage sequence of pseudorandom permutations. The present... 

US20080170685 
Data scrambling circuit
A data scrambling circuit is provided. The data scrambling circuit includes an integrated circuit having a digital logic device and an interface circuit coupled to the digital logic device. Also... 

US20090010431 
METHOD FOR THE RAPID SYNCHRONISATION OF A DEVICE FOR RECEIVING SCRAMBLED DATA, USING AN OPTIMISED CALCULATION OF A SYNCHRONISATION VALUE
The disclosure relates to a method of synchronising a device for receiving scrambled data, using at least one periodic scrambling sequence which is divided into K time intervals, each interval... 

US20070195949 
Encryption processing method and encryption processing device
An increase in safety from attacks by use of hardwarelike methods by smallsized hardware is achieved. An encryption processing device includes a logical circuit capable of programmably setting... 