Match Document Document Title
US20090296923 Signature generation apparatus and signature verification apparatus  
A signature generation apparatus generates a signature for a message m from the i-th user, and computes any two or three of a[1]μ[x](mod n), a[2]μ[s](mod n), and wμ[t](mod l) are in parallel. For...
US20050213751 Methods and systems for generating transcodable encrypted content  
Methods and systems for generating transcodable encrypted content that includes independently processable components are disclosed. In one embodiment, transcodable content is accessed that...
US20100104093 Encryption Processing Apparatus, Encryption Processing Method, and Computer Program  
A common-key blockcipher processing configuration with enhanced immunity against attacks such as saturation attacks and algebraic attacks (XSL attacks) is realized. In an encryption processing...
US20120207298 APPARATUS AND METHOD FOR CALCULATING A RESULT IN A SCALAR MULTIPLICATION  
An apparatus for calculating a result of a scalar multiplication of a reference number with a reference point on an elliptic curve includes a random number generator and processor. The random...
US20140328481 IDENTIFICATION INFORMATION GENERATION DEVICE AND IDENTIFICATION INFORMATION GENERATION METHOD  
Provided is an identification information generation device capable of generating identification information with its complete individual identifiability guaranteed. The identification information...
US20130336474 CRYPTOGRAPHIC PROCESSING SYSTEM, KEY GENERATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, KEY DELEGATION DEVICE, CRYPTOGRAPHIC PROCESSING METHOD, AND CRYPTOGRAPHIC PROCESSING PROGRAM  
Hierarchical predicate encryption (HPE) for inner products with enhanced efficiency of operations. A cryptographic processing system includes a key generation device, an encryption device, and a...
US20080181398 METHODS AND APPARATUS FOR ENHANCING PRIVACY OF OBJECTS ASSOCIATED WITH RADIO-FREQUENCY IDENTIFICATION TAGS  
Encoding radio-frequency identification (RFID) tags, each of the RFID tags having an tag identifier, t, and associated with a corresponding item, in a manner that preserves privacy of information...
US20080292098 COMMUNICATION SYSTEM AND RECEIVER DEVICE  
A communication system includes: a transmission device; and a reception device, wherein the transmission device includes an encryption section that encrypts a plaintext to be transmitted to the...
US20090022311 METHOD OF COMPRESSING A CRYPTOGRAPHIC VALUE  
A method of compressing a cryptographic value. The method comprising the steps of: (a) selecting a secret value; (b) performing a cryptographic operation on the secret value to generate the...
US20070291933 METHOD AND SYSTEM FOR REUSING AN MMH FUNCTION TO PERFORM A FAST MMH-MAC CALCULATION  
A transmitting and receiving device share a secret which is split into first and second portions. A public function is used to generate a keystream. The length of the keystream is adjusted to...
US20090214023 Method for elliptic curve scalar multiplication  
The method for elliptic curve scalar multiplication may provide several countermeasures to protect scalar multiplication of a private key k by a point P to produce the product kP from power...
US20090310775 Using a single instruction multiple data (SIMD) instruction to speed up galois counter mode (GCM) computations  
In one embodiment, an encryption operation may be performed by obtaining a product of a carry-less multiplication using multiple single instruction multiple data (SIMD) multiplication instructions...
US20100128869 METHOD AND DEVICE FOR EXECUTING A CRYPTOGRAPHIC CALCULATION  
The invention concerns a method which consists in operating a key generation in an electronic component for a specific cryptographic algorithm; storing in the electronic component a prime number P...
US20070189525 Method and system providing scrambled content  
A method of providing scrambled data includes providing a stream of data units based on a sequence of clear data units by at least subjecting at least part of at least some of the clear data units...
US20090168999 Method and apparatus for performing cryptographic operations  
In one embodiment, the present invention includes a processor having logic to perform a round of a cryptographic algorithm responsive to first and second round micro-operations to perform the...
US20060013387 Method and system for implementing KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets  
In a wireless communication system, a method and system for implementing a KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets are provided. A pipelined...
US20100150340 DEVICE AND METHOD FOR ELLIPTIC CURVE CRYPTOSYSTEM  
An exemplary embodiment of the present invention provides a method and an apparatus for minimizing a difference in data path between elliptic curve point addition and elliptic curve point...
US20140233726 DECRYPTION METHOD, RECORDING MEDIUM STORING DECRYPTION PROGRAM, DECRYPTION DEVICE, KEY GENERATION METHOD, AND RECORDING MEDIUM STORING KEY GENERATION PROGRAM  
A decryption method includes receiving an input of an n-dimensional vector whose elements other than a first element are all zero, or of the first element. The vector is a ciphertext obtained by...
US20110249814 DEVICE AND A METHOD FOR PERFORMING A CRYPTOGRAPHIC FUNCTION  
The present invention provides a method and an apparatus for encrypting and decrypting digital information while imparting a high level of security on the encrypted digital information. A...
US20080310621 PRIVACY ENHANCED COMPARISON OF DATA SHEETS  
A computer implemented method for performing a privacy enhanced comparison of a plurality of data sets includes allocating a private encryption key to each of the data sets; performing an...
US20080232585 Method for Code Generation  
A method for generating codes for encrypting data of an encrypting device and for decrypting said data by a decrypting device. The method includes the steps of providing a personal identification...
US20070058801 Managing the encryption of data  
Embodiments of methods, devices and/or systems for managing the encryption of data are described.
US20100088526 System and Method for Modular Exponentiation  
To calculate the equation y=xe mod n, integral to solving cryptographic and authentication problems, much computing power is required despite elegant algorithms that greatly reduce the number of...
US20130083919 ACCESS CONTROL METHOD, INFORMATION DISPLAY DEVICE USING THE SAME, AND INFORMATION DISPLAY SYSTEM  
When a user carries a mobile terminal with confidential information, such as customer information, stored therein, it is required to maintain information confidentiality and to prevent an...
US20090279688 CLOSED GALOIS FIELD CRYPTOGRAPHIC SYSTEM  
A cryptographic system (CS) comprised of generators (502), (504), (510), an encryption device (ED), and a decryption device (DD). The generator (502) generates a data sequence (DS) including...
US20060280297 Cipher communication system using device authentication keys  
A cipher communication method includes preparing cipher text data which can be decrypted only by a specific partner device, and performing encryption and decryption processing at high speed with...
US20080304659 METHOD AND APPARATUS FOR EXPANSION KEY GENERATION FOR BLOCK CIPHERS  
A key scheduler performs a key-expansion to generate round keys for AES encryption and decryption just-in-time for each AES round. The key scheduler pre-computes slow operations in a current clock...
US20090080646 Method And Architecture For Parallel Calculating Ghash Of Galois Counter Mode  
Disclosed is a method and architecture for parallel calculating GHASH of Galois Counter Mode (GCM), which regards the additional authenticated data A and the ciphertext C defined in the GCM as a...
US20080095360 Signature System and Signature Method  
A signature system in which size of data to be transmitted is small and data can be processed efficiently in a Merkle signature system having high security. A processing part 112 of a smartcard...
US20060120520 Encryption device, encryption processing method and program, and information protection system employing the encryption device  
An encryption device includes a first unit that acquires value information denoting a value of information to be encrypted, and a second unit that calculates a strength parameter denoting an...
US20140145353 TAMPER-RESISTANT COATING FOR AN INTEGRATED CIRCUIT  
A system may include an integrated circuit and a coating at least partially encapsulating the integrated circuit. The coating may include an electrically insulating material at least partially...
US20120121080 COMMUTATIVE ORDER-PRESERVING ENCRYPTION  
In one general aspect, a method, including executing instructions recorded on a non-transitory computer-readable storage media using at least one processor, includes encrypting data using a...
US20090172507 Information Processing System  
According to one embodiment, an information processing system is coupled to a number of sensors for receiving information generated by the sensors. The information processing system generates...
US20090168998 EXECUTING AN ENCRYPTION INSTRUCTION USING STORED ROUND KEYS  
Embodiments of an invention for executing an encryption instruction using stored round keys are disclosed. In one embodiment, an apparatus includes instruction logic, encryption logic, a storage...
US20080144809 Encryption process, encryption device, and computer-readable medium storing encryption program  
A process, a device, and a computer-readable medium storing a program, for encryption. A conversion table having regions each of which stores 2i character codes associated with index values is...
US20120201374 SYSTEMS AND METHODS FOR IMPLEMENTING BLOCK CIPHER ALGORITHMS ON ATTACKER-CONTROLLED SYSTEMS  
Systems and methods for an implementation of block cipher algorithms (e.g., AES) use lookup tables to obscure key information, increasing difficulty of reverse engineering efforts. The...
US20100034385 COMBINATIONAL COMBINER CRYPTOGRAPHIC METHOD AND APPARATUS  
Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected...
US20100275028 VERIFICATION APPARATUS  
In an integer partitioning process S701, an integer partitioning unit 110 inputs an order p of a finite group G and an integer e, and calculates an integer e1 and an integer e2 that satisfy...
US20130028415 CRYPTOGRAPHIC PROCESSING SYSTEM, KEY GENERATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, SIGNATURE PROCESSING SYSTEM, SIGNATURE DEVICE, AND VERIFICATION DEVICE  
The object is to provide a secure functional encryption scheme having a large number of cryptographic functions. An access structure is constituted by applying the inner-product of attribute...
US20100202605 METHOD OF OPTIMIZING COMBINATIONAL CIRCUITS  
A method of simplifying a combinational circuit establishes an initial combinational circuit operable to calculate a set of target signals. A quantity of multiplication operations performed in a...
US20100098242 APPARATUS AND METHOD FOR EVALUATING A CIPHER STRUCTURE'S RESISTANCE TO CRYPTANALYSIS  
Disclosed is a method for evaluating resistance to cryptanalysis of a cipher structure having a diffusion element including a linear transformation placed between differently-sized confusion...
US20070014395 Invariance based concurrent error detection for the advanced encryption standard  
Advanced Encryption Standard (AES) is an encryption algorithm for securing sensitive unclassified material by U.S. Government agencies and, as a consequence the de facto encryption standard for...
US20140140502 RELIABLE PHYSICAL UNCLONABLE FUNCTION FOR DEVICE AUTHENTICATION  
A device having a physical unclonable function includes an integrated circuit and a phase change memory embedded in the integrated circuit and including a plurality of cells, where the phase...
US20090103716 Information Processing Apparatus  
A high-security cryptanalysis-resistant cryptographic processing apparatus and a cryptographic processing method are provided. A Feistel common key block cipher is produced by repeatedly...
US20150229472 CRYPTOGRAPHIC SYSTEM  
An inner-product predicate encryption scheme with improved flexibility without a restriction that the dimensions of an attribute vector x→ and a predicate vector v→ should be equivalent. A...
US20070116268 METHOD OF DELIVERING CONTENT DATA AND COMMUNICATION TERMINAL FOR USE THEREIN  
A method of delivering content data is provided that makes content data able to be reproduced at a user terminal by delivering content key data necessary to decrypt the content data. Specifically,...
US20080192924 Data encryption without padding  
The present invention relates generally to data encryption. In particular, the present invention relates to methods of block cipher encryption and decryption. Embodiments of the present invention...
US20070098157 Using code as keys for copy protection  
A method for obscuring data and software including the steps of (A) generating code for performing a predefined operation using one or more sets of predefined data, (B) generating a first binary...
US20080130873 Flexible hardware architecture for ECC/HECC based crytography  
A circuit for implementing elliptic curve and hyperelliptic curve encryption and decryption operations, having a read only memory with no more than about two kilobytes of accessible memory,...
US20060233358 Method and system for shipment authentication  
In one embodiment of the present invention, a source point of a supply chain secures shipment of an object by devising an encryption key and encrypting a message using the encryption key to...