Match Document Document Title
US20100125523 METHOD AND A SYSTEM FOR CERTIFYING A DOCUMENT FOR ADVERTISEMENT APPROPRIATENESS  
A method for selecting advertisement spots. The method comprises certifying a digital document having a placeholder for at least one advertisement, identifying at least one characteristic...
US20080170694 CIRCUIT SECURITY  
A system is provided in which a first circuit is protected by security features provided by a second circuit. The first circuit comprises a processor which retrieves content from a memory....
US20120033805 FINITE FIELD CALCULATION APPARATUS, FINITE FILED CALCULATION METHOD, PROGRAM, AND RECORDING MEDIUM  
A calculation Πi=0N−1e(R(i, 0), . . . , R(i, K−1)) where a calculation of K elements R(i, k)∈GF(pm) of a finite field GF(pm) over a finite field is expressed as e(R(i, 0), . . . , R(i, K−1)) is...
US20150195083 HOMOMORPHIC CRYPTOGRAPHY MODELING IN SUPPORT OF PRIVACY POLICIES  
Data privacy is becoming increasingly important and, in some jurisdictions, required. Access to private data can be controlled by forcing all access to go through minimizations services that allow...
US20100080387 PORTABLE MEMORY AND A METHOD FOR ENCRYPTING THE SAME  
The present invention provides a portable memory, comprising: a key storage unit for storing a register key for the portable memory; a key receiving unit for receiving a first key entered by a...
US20060098814 Method for communicating securely over an insecure communication channel  
A method for enhancing the security of cryptographic systems against side channel attacks and cryptanalysis is based on the concept of object hopping or dynamic transformation of elements between...
US20100268952 Optimization of Signing SOAP Body Element  
An XML digital signature mechanism for providing message integrity. A sending party serializes a source XML document into a serialized byte array, calculates the source offset and length of the...
US20090052655 Method for Encryption and Decryption  
It is described a method of encrypting digital information in a sender and decrypting said digital information in a receiver, where said sender and receiver agree on a block of a working key....
US20090214024 Block cipher using multiplication over a finite field of even characteristic  
An input block of data and a key that includes multiple sub-keys are received by a block cipher. A nonlinear substitution is performed on at least a portion of the data, wherein the nonlinear...
US20100189257 Lightweight Streaming Protection by Sequence Number Scrambling  
Methods and apparatus for securely streaming multimedia packets, such as RTP packets, are disclosed, in which the payloads of the packets are shuffled. This reordering is performed using a...
US20080037783 Device and method for providing video stream having integrity  
Provided are a device and method for providing a video stream, in which a hash value of a frame is included in the header of a video stream, and authentication information about the header is...
US20100008496 ENCRYPTION AND SIGNATURE SCHEMES USING MESSAGE MAPPINGS TO REDUCE THE MESSAGE SIZE  
According to some embodiments of the invention, a message is processed before encryption so that the encryption method generates a short ciphertext. The message processing can be viewed as a...
US20070286413 Cryptographic systems for encrypting input data using an address associated with the input data, error detection circuits, and methods of operating the same  
A cryptographic system includes encryption logic that is configured to encrypt input data by performing a mask operation on the input data using an address associated with the input data.
US20090092245 Protection Against Side Channel Attacks  
The invention relates to a cryptographic mechanism and to a cryptographic device incorporating such cryptographic mechanism. The cryptographic mechanism offers a better resistance to side channel...
US20120163581 ELLIPTIC CURVE CRYPTOGRAHY WITH FRAGMENTED KEY PROCESSING AND METHODS FOR USE THEREWITH  
A cryptography module includes a key store having a plurality of storage locations for storing a private key as k key fragments. One or more crypto-processing segments each operate based on...
US20090022309 METHOD OF PROVIDING TEXT REPRESENTATION OF A CRYPTOGRAPHIC VALUE  
A method of representing crytographic values in text form is described. The text representation is formed from words selected from a vocabulary, which may include a collection of pseudowords. The...
US20100254532 METHOD OF OBSCURING CRYPTOGRAPHIC COMPUTATIONS  
Obscuring cryptographic computations may be accomplished by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the...
US20110280395 IMAGE ENCRYPTION DEVICE, IMAGE DECRYPTION DEVICE AND METHODS  
Constraints are added to the size of an encryption area at the time of encryption processing. For example, if the respective number of horizontal and vertical divided blocks is divided by a...
US20100074436 Method, apparatus and computer program support for regular recording of a positive integer  
A regular method for recoding a positive integer n in which an integer s smaller than n is chosen for defining an integer n′=n−s whose m-ary representation is added digit-wise to the m-ary...
US20080212769 Processing method for message integrity with tolerance for non-sequential arrival of message data  
Example embodiments of the present invention disclose a method for processing an application packet for transmission includes receiving a plurality of segments of the application packet in a byte...
US20050249348 Data encryption/decryption method, device, and program  
Encryption is executed with respect to an encryption target unit based on an encryption ratio with maintaining the same data length both prior to and subsequent to the encryption process. In...
US20110103579 FORMAT PRESERVING ENCRYPTION SYSTEMS FOR DATA STRINGS WITH CONSTRAINTS  
Format preserving encryption (FPE) cryptographic engines are provided for performing encryption and decryption on strings. A plaintext string may be converted to ciphertext by repeated application...
US20100061551 ENCRYPTION/DECRYPTION APPARATUS AND METHOD USING AES RIJNDAEL ALGORITHM  
An encryption/decryption apparatus and method using an advanced encryption standard (AES) Rijndael algorithm are provided. The apparatus includes a round key operator that performs arithmetic...
US20130108039 LIGHTWEIGHT STREAM CIPHER CRYPTOSYSTEMS  
There is disclosed an apparatus and method for generating a keystream with ideal two-level autocorrelation, which can be efficiently implemented in both software and hardware on mobile devices...
US20150154598 Secure Interaction with Input Devices  
Methods of obtaining input on a physical input device are provided. A virtual input device is superimposed over the physical input device. The virtual input device has a different layout than the...
US20090285386 Apparatus for Generating Elliptic Curve Cryptographic Parameter, Apparatus for Processing Elliptic Curve Cryptograph, Program for Generating Elliptic Curve Cryptographic Parameter, and Program for Processing Elliptic Cryptograph  
A prime number generation unit 110 generates an integer r having a form suitable for fast elliptic curve pairing computation, by using a processing device (S302 to S303). The prime number...
US20090168994 Method for providing stronger encryption using conventional ciphers  
A method of transforming files that will produce a much stronger encryption over conventional encryption methods.
US20090196415 HYBRID METHOD FOR DISTRIBUTING KEYS FOR THE DIFFUSION OF ENCRYPTED DATA  
The invention relates to a method for broadcasting data in a system using a BES (A1) stateless scheme using a binary tree T with a KEKs No 2 key structure, i.e. such that a key ki,j is associated...
US20070086587 System and method for exchanging a transformed message with enhanced privacy  
A system and method for exchanging a transformed message with enhanced privacy is presented. A set of input messages is defined. A set of output messages is defined. A message is selected from the...
US20050175174 Calculating the modular inverses of a value  
In a method for calculating the modular inverse R of a value E in relation to a module M, a breakdown of the module M into at least two factors M1, M2 is determined, a respective auxiliary value...
US20050157872 RSA public key generation apparatus, RSA decryption apparatus, and RSA signature apparatus  
An RSA decryption apparatus that is used in an IC card or the like counters a differential fault attack. The RSA decryption apparatus computes at high speed a public key used in data verification,...
US20090196414 Online data conversion technique  
An embodiment of the invention provides an apparatus and method for online data conversion. The apparatus and method are configured to read data that is overlapped by a window in a first position...
US20150074426 Generating and Using an Enhanced Initialization Vector  
Embodiments for generating and using an enhanced initialization vector are disclosed. In one embodiment, data and a record identifier to which the data is to be written are received. An...
US20100185853 LOCAL AREA NETWORK ARCHITECTURE  
The present disclosure provides a local area network architecture including a server, a client and a data transfer system. The server uses a first operating system and includes an encryption chip...
US20080118060 Method of decoding/encoding content file  
A method of decoding/encoding a content file is provided. The method of decoding a content file includes dividing an encoded content file into a plurality of data blocks, grouping the plurality of...
US20100232600 Exclusive encryption system  
An encryption system includes a plurality of encryption operations including individual encryption operations and group encryption operations available for application in the encryption of data....
US20150043729 INSTRUCTION AND LOGIC TO PROVIDE A SECURE CIPHER HASH ROUND FUNCTIONALITY  
Instructions and logic provide secure cipher hashing algorithm round functionality. Some embodiments include a processor comprising: a decode stage to decode an instruction for a secure cipher...
US20140270153 System and Method for Content Encryption in a Key/Value Store  
System and method embodiments are provided for content encryption in a key/value store. The embodiments include encrypting both the key and value of client data blocks for storage so that the data...
US20050281404 Scalable streaming media authentication  
Consumer networks, increasingly used for multimedia information and commercial content delivery, are destined to be heterogeneous. To provide QoS, it is necessary to adapt the multimedia stream to...
US20100074441 Data processing systems with format-preserving encryption and decryption engines  
A data processing system is provided that includes format-preserving encryption and decryption engines. A string that contains characters has a specified format. The format defines a legal set of...
US20090196416 TWEAKABLE BLOCK ENCRYPTION APPARATUS, METHOD, AND PROGRAM  
A tweakable block cipher apparatus includes an input unit that receives a pair of a plaintext M and a tweak; an offset calculation unit that calculates a sum of a value (E(K, const)), which is...
US20090046851 METHOD AND SYSTEM FOR ATOMICITY FOR ELLIPTIC CURVE CRYPTOSYSTEMS  
A method and system are provided for atomicity for elliptic curve cryptosystems (ECC-systems). The method includes a side channel atomic scalar multiplication algorithm using mixed coordinates....
US20100192199 CREATING AND USING A SPECIFIC USER UNIQUE ID FOR SECURITY LOGIN AUTHENTICATION  
A method of monitoring all network login activity, which includes a real-time analysis of intercepting all network login activity, analyzing network login activity, authenticating network login...
US20090060174 COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR PROTECTING A SOFTWARE INSTALLATION AFTER CERTIFICATION  
A computer-implemented system and method for protecting a software installation after certification are disclosed. The system includes components to determine if a cryptographic value of a digital...
US20060098815 Methods of encoding and decoding data  
A cryptographic process (100) receives variable length user data (150) as input and performs an initialization process, at least one pass of at least one pass function and an output function. The...
US20080292096 Hybrid data encryption  
A method and apparatus for encrypting and decrypting data. A first block cipher encrypts data to generate a first cipher output. A first double irregular columnar transposition cipher encrypts the...
US20100257371 ENCRYPTION/DECRYPTION SYSTEM AND METHOD THEREOF  
An encryption/decryption system includes a displaying unit, an operating unit, a pressure sensing unit and an indicating unit. The displaying unit is configured for displaying files. The operating...
US20080256353 Method and Apparatus for Hiding Information in Communication protocol  
A method and apparatus for hiding information in a communication protocol signal are disclosed. The apparatus comprises a bit selection unit, an information encoding unit and an information...
US20080205634 METHOD, MODULE AND SYSTEM FOR PROVIDING CIPHER DATA  
A method of providing cipher data during a period of time when output of a primary source of cipher data is unavailable is disclosed. The method comprises switching from a primary source of cipher...
US20090150680 Data Security in Mobile Devices  
Systems, methods for computer program products for securely storing data in a data store or in an external data store associated with a mobile device are described herein. Data that is being sent...