Match

Document 
Document Title 

US20090296923 
Signature generation apparatus and signature verification apparatus
A signature generation apparatus generates a signature for a message m from the ith user, and computes any two or three of a[1]μ[x](mod n), a[2]μ[s](mod n), and wμ[t](mod l) are in parallel. For... 

US20050213751 
Methods and systems for generating transcodable encrypted content
Methods and systems for generating transcodable encrypted content that includes independently processable components are disclosed. In one embodiment, transcodable content is accessed that... 

US20100104093 
Encryption Processing Apparatus, Encryption Processing Method, and Computer Program
A commonkey blockcipher processing configuration with enhanced immunity against attacks such as saturation attacks and algebraic attacks (XSL attacks) is realized. In an encryption processing... 

US20120207298 
APPARATUS AND METHOD FOR CALCULATING A RESULT IN A SCALAR MULTIPLICATION
An apparatus for calculating a result of a scalar multiplication of a reference number with a reference point on an elliptic curve includes a random number generator and processor. The random... 

US20140328481 
IDENTIFICATION INFORMATION GENERATION DEVICE AND IDENTIFICATION INFORMATION GENERATION METHOD
Provided is an identification information generation device capable of generating identification information with its complete individual identifiability guaranteed. The identification information... 

US20130336474 
CRYPTOGRAPHIC PROCESSING SYSTEM, KEY GENERATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, KEY DELEGATION DEVICE, CRYPTOGRAPHIC PROCESSING METHOD, AND CRYPTOGRAPHIC PROCESSING PROGRAM
Hierarchical predicate encryption (HPE) for inner products with enhanced efficiency of operations. A cryptographic processing system includes a key generation device, an encryption device, and a... 

US20080181398 
METHODS AND APPARATUS FOR ENHANCING PRIVACY OF OBJECTS ASSOCIATED WITH RADIOFREQUENCY IDENTIFICATION TAGS
Encoding radiofrequency identification (RFID) tags, each of the RFID tags having an tag identifier, t, and associated with a corresponding item, in a manner that preserves privacy of information... 

US20080292098 
COMMUNICATION SYSTEM AND RECEIVER DEVICE
A communication system includes: a transmission device; and a reception device, wherein the transmission device includes an encryption section that encrypts a plaintext to be transmitted to the... 

US20090022311 
METHOD OF COMPRESSING A CRYPTOGRAPHIC VALUE
A method of compressing a cryptographic value. The method comprising the steps of: (a) selecting a secret value; (b) performing a cryptographic operation on the secret value to generate the... 

US20070291933 
METHOD AND SYSTEM FOR REUSING AN MMH FUNCTION TO PERFORM A FAST MMHMAC CALCULATION
A transmitting and receiving device share a secret which is split into first and second portions. A public function is used to generate a keystream. The length of the keystream is adjusted to... 

US20090214023 
Method for elliptic curve scalar multiplication
The method for elliptic curve scalar multiplication may provide several countermeasures to protect scalar multiplication of a private key k by a point P to produce the product kP from power... 

US20090310775 
Using a single instruction multiple data (SIMD) instruction to speed up galois counter mode (GCM) computations
In one embodiment, an encryption operation may be performed by obtaining a product of a carryless multiplication using multiple single instruction multiple data (SIMD) multiplication instructions... 

US20100128869 
METHOD AND DEVICE FOR EXECUTING A CRYPTOGRAPHIC CALCULATION
The invention concerns a method which consists in operating a key generation in an electronic component for a specific cryptographic algorithm; storing in the electronic component a prime number P... 

US20070189525 
Method and system providing scrambled content
A method of providing scrambled data includes providing a stream of data units based on a sequence of clear data units by at least subjecting at least part of at least some of the clear data units... 

US20090168999 
Method and apparatus for performing cryptographic operations
In one embodiment, the present invention includes a processor having logic to perform a round of a cryptographic algorithm responsive to first and second round microoperations to perform the... 

US20060013387 
Method and system for implementing KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets
In a wireless communication system, a method and system for implementing a KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets are provided. A pipelined... 

US20100150340 
DEVICE AND METHOD FOR ELLIPTIC CURVE CRYPTOSYSTEM
An exemplary embodiment of the present invention provides a method and an apparatus for minimizing a difference in data path between elliptic curve point addition and elliptic curve point... 

US20140233726 
DECRYPTION METHOD, RECORDING MEDIUM STORING DECRYPTION PROGRAM, DECRYPTION DEVICE, KEY GENERATION METHOD, AND RECORDING MEDIUM STORING KEY GENERATION PROGRAM
A decryption method includes receiving an input of an ndimensional vector whose elements other than a first element are all zero, or of the first element. The vector is a ciphertext obtained by... 

US20110249814 
DEVICE AND A METHOD FOR PERFORMING A CRYPTOGRAPHIC FUNCTION
The present invention provides a method and an apparatus for encrypting and decrypting digital information while imparting a high level of security on the encrypted digital information. A... 

US20080310621 
PRIVACY ENHANCED COMPARISON OF DATA SHEETS
A computer implemented method for performing a privacy enhanced comparison of a plurality of data sets includes allocating a private encryption key to each of the data sets; performing an... 

US20080232585 
Method for Code Generation
A method for generating codes for encrypting data of an encrypting device and for decrypting said data by a decrypting device. The method includes the steps of providing a personal identification... 

US20070058801 
Managing the encryption of data
Embodiments of methods, devices and/or systems for managing the encryption of data are described. 

US20100088526 
System and Method for Modular Exponentiation
To calculate the equation y=xe mod n, integral to solving cryptographic and authentication problems, much computing power is required despite elegant algorithms that greatly reduce the number of... 

US20130083919 
ACCESS CONTROL METHOD, INFORMATION DISPLAY DEVICE USING THE SAME, AND INFORMATION DISPLAY SYSTEM
When a user carries a mobile terminal with confidential information, such as customer information, stored therein, it is required to maintain information confidentiality and to prevent an... 

US20090279688 
CLOSED GALOIS FIELD CRYPTOGRAPHIC SYSTEM
A cryptographic system (CS) comprised of generators (502), (504), (510), an encryption device (ED), and a decryption device (DD). The generator (502) generates a data sequence (DS) including... 

US20060280297 
Cipher communication system using device authentication keys
A cipher communication method includes preparing cipher text data which can be decrypted only by a specific partner device, and performing encryption and decryption processing at high speed with... 

US20080304659 
METHOD AND APPARATUS FOR EXPANSION KEY GENERATION FOR BLOCK CIPHERS
A key scheduler performs a keyexpansion to generate round keys for AES encryption and decryption justintime for each AES round. The key scheduler precomputes slow operations in a current clock... 

US20090080646 
Method And Architecture For Parallel Calculating Ghash Of Galois Counter Mode
Disclosed is a method and architecture for parallel calculating GHASH of Galois Counter Mode (GCM), which regards the additional authenticated data A and the ciphertext C defined in the GCM as a... 

US20080095360 
Signature System and Signature Method
A signature system in which size of data to be transmitted is small and data can be processed efficiently in a Merkle signature system having high security. A processing part 112 of a smartcard... 

US20060120520 
Encryption device, encryption processing method and program, and information protection system employing the encryption device
An encryption device includes a first unit that acquires value information denoting a value of information to be encrypted, and a second unit that calculates a strength parameter denoting an... 

US20140145353 
TAMPERRESISTANT COATING FOR AN INTEGRATED CIRCUIT
A system may include an integrated circuit and a coating at least partially encapsulating the integrated circuit. The coating may include an electrically insulating material at least partially... 

US20120121080 
COMMUTATIVE ORDERPRESERVING ENCRYPTION
In one general aspect, a method, including executing instructions recorded on a nontransitory computerreadable storage media using at least one processor, includes encrypting data using a... 

US20090172507 
Information Processing System
According to one embodiment, an information processing system is coupled to a number of sensors for receiving information generated by the sensors. The information processing system generates... 

US20090168998 
EXECUTING AN ENCRYPTION INSTRUCTION USING STORED ROUND KEYS
Embodiments of an invention for executing an encryption instruction using stored round keys are disclosed. In one embodiment, an apparatus includes instruction logic, encryption logic, a storage... 

US20080144809 
Encryption process, encryption device, and computerreadable medium storing encryption program
A process, a device, and a computerreadable medium storing a program, for encryption. A conversion table having regions each of which stores 2i character codes associated with index values is... 

US20120201374 
SYSTEMS AND METHODS FOR IMPLEMENTING BLOCK CIPHER ALGORITHMS ON ATTACKERCONTROLLED SYSTEMS
Systems and methods for an implementation of block cipher algorithms (e.g., AES) use lookup tables to obscure key information, increasing difficulty of reverse engineering efforts. The... 

US20100034385 
COMBINATIONAL COMBINER CRYPTOGRAPHIC METHOD AND APPARATUS
Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected... 

US20100275028 
VERIFICATION APPARATUS
In an integer partitioning process S701, an integer partitioning unit 110 inputs an order p of a finite group G and an integer e, and calculates an integer e1 and an integer e2 that satisfy... 

US20130028415 
CRYPTOGRAPHIC PROCESSING SYSTEM, KEY GENERATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, SIGNATURE PROCESSING SYSTEM, SIGNATURE DEVICE, AND VERIFICATION DEVICE
The object is to provide a secure functional encryption scheme having a large number of cryptographic functions. An access structure is constituted by applying the innerproduct of attribute... 

US20100202605 
METHOD OF OPTIMIZING COMBINATIONAL CIRCUITS
A method of simplifying a combinational circuit establishes an initial combinational circuit operable to calculate a set of target signals. A quantity of multiplication operations performed in a... 

US20100098242 
APPARATUS AND METHOD FOR EVALUATING A CIPHER STRUCTURE'S RESISTANCE TO CRYPTANALYSIS
Disclosed is a method for evaluating resistance to cryptanalysis of a cipher structure having a diffusion element including a linear transformation placed between differentlysized confusion... 

US20070014395 
Invariance based concurrent error detection for the advanced encryption standard
Advanced Encryption Standard (AES) is an encryption algorithm for securing sensitive unclassified material by U.S. Government agencies and, as a consequence the de facto encryption standard for... 

US20140140502 
RELIABLE PHYSICAL UNCLONABLE FUNCTION FOR DEVICE AUTHENTICATION
A device having a physical unclonable function includes an integrated circuit and a phase change memory embedded in the integrated circuit and including a plurality of cells, where the phase... 

US20090103716 
Information Processing Apparatus
A highsecurity cryptanalysisresistant cryptographic processing apparatus and a cryptographic processing method are provided. A Feistel common key block cipher is produced by repeatedly... 

US20150229472 
CRYPTOGRAPHIC SYSTEM
An innerproduct predicate encryption scheme with improved flexibility without a restriction that the dimensions of an attribute vector x→ and a predicate vector v→ should be equivalent. A... 

US20070116268 
METHOD OF DELIVERING CONTENT DATA AND COMMUNICATION TERMINAL FOR USE THEREIN
A method of delivering content data is provided that makes content data able to be reproduced at a user terminal by delivering content key data necessary to decrypt the content data. Specifically,... 

US20080192924 
Data encryption without padding
The present invention relates generally to data encryption. In particular, the present invention relates to methods of block cipher encryption and decryption. Embodiments of the present invention... 

US20070098157 
Using code as keys for copy protection
A method for obscuring data and software including the steps of (A) generating code for performing a predefined operation using one or more sets of predefined data, (B) generating a first binary... 

US20080130873 
Flexible hardware architecture for ECC/HECC based crytography
A circuit for implementing elliptic curve and hyperelliptic curve encryption and decryption operations, having a read only memory with no more than about two kilobytes of accessible memory,... 

US20060233358 
Method and system for shipment authentication
In one embodiment of the present invention, a source point of a supply chain secures shipment of an object by devising an encryption key and encrypting a message using the encryption key to... 