Match Document Document Title
US20090171878 PROVABLE DATA INTEGRITY VERIFYING METHOD, APPARATUSES AND SYSTEM  
The present invention proposes a Provable Data Integrity (PDI) verifying method, in which data are firstly fingerprinted at a client, and the fingerprints are sent to an archive along with the...
US20090086962 ENCRYPTION OPERATING APPARATUS  
Valid code data and invalid code data are alternately input to a register that fetches data synchronously with a clock signal. A state of a data value input to the register is monitored. Each time...
US20100046743 APPARATUS FOR PERFORMING DATA COMPRESSION PROCESSING USING ALGEBRAIC TORUS  
A compressing unit compresses an element on an algebraic torus into affine representation according to a compression map. A determining unit determines whether a target element on the algebraic...
US20090254997 Method and apparatus for content rights management  
The instant invention relates to a method and apparatus for restricting access to digital content through the use of an exemplary form of digital encryption which ties the delivered content to a...
US20090016525 ENCODING/DECODING APPARATUS  
An encoding/decoding apparatus comprises a central processing unit and an encryption/decryption accelerator coupled to the central processing unit. The accelerator comprises an input for input...
US20140169553 MASKING WITH SHARED RANDOM BITS  
A non-linear transformation including a plurality of non-linear logical operations is masked to a second or higher order. The masking includes receiving a set of random bits, and machine-masking...
US20120121083 ENCRYPTION APPARATUS AND METHOD  
An encryption method and apparatus for encrypting a plurality of rounds are provided. The encryption method including: extracting a conversion function, which is convertible in a table form from a...
US20090187757 METHOD AND SYSTEM FOR MEDIATED SECURE COMPUTATION  
Techniques are described for mediated secure computation. A unique identifier value may be assigned to each one of a plurality of nodes included in a network. An encrypted portion of a logical...
US20090003589 Native Composite-Field AES Encryption/Decryption Accelerator Circuit  
A system comprises reception of input data of a Galois field GF(2k), mapping of the input data to a composite Galois field GF(2nm), where k=nm, inputting of the mapped input data to an Advanced...
US20080260147 METHOD AND APPARATUS FOR ENCRYPTING MESSAGE FOR MAINTAINING MESSAGE INTEGRITY, AND METHOD AND APPARATUS FOR DECRYPTING MESSAGE FOR MAINTAINING MESSAGE INTEGRITY  
A method of encrypting a message for message integrity is provided. In the method, a random number is generated, a first ciphertext is generated by encrypting the message by using the generated...
US20090190762 METHOD AND SYSTEM FOR PREVENTING GENERATION OF DECRYPTION KEYS VIA SAMPLE GATHERING  
Methods and systems for preventing generation of decryption keys via statistical sample gathering may include verifying a one-key message authentication code (OMAC) decryption key in received data...
US20070242821 Method and apparatus for acquiring domain information and domain-related data  
Provided are a method and apparatus for acquiring data regarding a domain for the protection of digital content, and more particularly, a method and apparatus for acquiring domain information and...
US20100146296 APPARATUS AND METHOD FOR HASH CRYPTOGRAPHY  
An apparatus for hash cryptography has a hardware structure that is capable of providing both secure hash algorithm (SHA)-1 hash calculation and SHA-256 hash calculation. The apparatus for hash...
US20110026705 METHOD AND SYSTEM FOR PREVENTING COPY OF PLATFORM  
A method and system for preventing copy of a platform are provided. A platform test apparatus includes a drive unit which drives a platform to cause the platform to move in a predetermined manner,...
US20150110264 Virtualized SHA Computational Engine  
A computational engine may comprise a working memory configured to receive a first input message and a second input message, a context memory coupled with the working memory, wherein the context...
US20150104010 FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES)  
A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also...
US20150104009 FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES)  
A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also...
US20150104008 FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES)  
A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also...
US20150104007 FLEXIBLE ARCHITECTURE AND INSTRUCTION FOR ADVANCED ENCRYPTION STANDARD (AES)  
A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also...
US20060023874 Method and multiline scrambled clock architecture with random state selection for implementing lower electromagnetic emissions  
A method and multiple line scrambled clock architecture with random state selection are provided for implementing lower electromagnetic emissions. A clock distribution circuit receives a clock...
US20080165954 System for encrypting and decrypting data using derivative equations and factors  
A data cryptographer encrypts and decrypts character data of any given length using derivative equations and factors. The use of factors and derivative equations introduces the randomness required...
US20080084995 METHOD AND SYSTEM FOR VARIABLE AND CHANGING KEYS IN A CODE ENCRYPTION SYSTEM  
Methods and systems are disclosed for decrypting segmented code of varying segment lengths wherein each segment of code may be protected with a different set of decryption parameters. Sets of...
US20130329883 METHOD FOR FULLY HOMOMORPHIC ENCRYPTION USING MULTIVARIATE CRYPTOGRAPHY  
Embodiments are described for a method of performing fully homomorphic encryption on a data set by providing a multivariate encryption polynomial to produce an encrypted data set and a...
US20110222684 PROTECTION OF REGISTERS AGAINST UNILATERAL DISTURBANCES  
A method for protecting a key intended to be used by an electronic circuit in an encryption or decryption algorithm, including the steps of: submitting the key to a first function taking a...
US20080019506 Encryption/Decryption Apparatus, System and Method  
A memory encryption/decryption apparatus includes a memory module, an encryption/decryption key and an encryption/decryption unit. The encryption/decryption unit uses the encryption/decryption key...
US20070071235 Encryption/decryption appararus  
A first Exclusive OR circuit operates an Exclusive OR between input data and a predetermined random number. An operation circuit performs one operation of encryption and decryption of output data...
US20120008766 SECURING A COMPONENT PRIOR TO MANUFACTURE OF A DEVICE  
By securing a component within a product, before the component is delivered to the final device manufacturing facility, the device manufacturing process can be made provably secure. Additionally,...
US20090202066 SCRAMBLER, SCRAMBLE PROCESSING METHOD, AND PROGRAM  
A multiplication value decision unit (12) decides a multiplication value which is a positive value or a negative value corresponding to a bit value of each bit contained in a binary bit string...
US20050169463 Hardware cryptographic engine and hardware cryptographic method using an efficient S-BOX implementation  
A hardware cryptographic engine implementing an Advanced Encryption Standard (AES) algorithm is disclosed. The hardware cryptographic engine comprises a plurality of modules corresponding to...
US20070030960 SYSTEM AND METHOD FOR GENERATING RANDOM PERMUTATIONS OF ELEMENTS  
A system and method for generating random permutations of elements (e.g., integers) in a test generation tool by providing one or more ordered ranges (110-170), each represented by a low and high...
US20070201690 Method and apparatus for configuring key of groups contained in domain  
Provided is a method and apparatus for configuring keys of groups contained in a domain. The method includes generating a common key and N distribution keys according to the number (N) of users...
US20050008149 Programmable data processing apparatus for CCMP hardware implementation  
The present invention relates to a programmable data processing apparatus that can minimize the extent of hardware modification by using a storage unit for storing the mutable fields of the WLAN...
US20080285743 Data Encryption Device and Data Encryption Method  
A data encryption device that is capable of stopping power analysis attacks and reducing instances of speed drops and memory amount increases in encryption processing more effectively than in the...
US20060291656 Encryption method and decoding method for a digital transmission system  
An encryption method and decoding method for a digital transmission system, in which the digital data stream comprises an alternating sequence of training sequences and data symbols, and the...
US20060034452 Code calculating device  
A code computing apparatus with an error detection code (CRC) generating function and an elliptic curve cryptography (ECC) function, comprising a matrix element computation part 30 for generating...
US20080002826 Copyright protection system, copyright protection device and video processing apparatus  
According to one embodiment, a copyright protection system includes a copyright protection device which encrypts the data for transferring to a processor via a bus and includes a copyright...
US20100054459 SYSTEM AND METHOD FOR MODULUS OBFUSCATION  
Disclosed herein are methods for obfuscating data on a client, on a server, and on a client and a server. The method on a client device includes receiving input data, storing an operation value in...
US20090316906 METHOD OF VERIFYING THE INTEGRITY OF AN ENCRYPTION KEY OBTAINED BY COMBINING KEY PARTS  
The method of verifying the integrity of an encryption key (K) obtained by combining at least two key portions (KM, M) in a protected zone (3) by using a commutative operator, comprises the steps...
US20090245507 DATA PROCESSING SYSTEM AND DATA PROCESSING METHOD  
A technique which contributes to materialization of efficient encryption even with devices such as smartcards restricted in memory resource is provided. The system for generating cryptographic...
US20080282087 System debug and trace system and method, and applications thereof  
An embedded system or system on chip (SoC) includes a secure JTAG system and method to provide secure on-chip control, capture, and export of on chip information in an embedded environment to a...
US20050031119 Method and communications device for secure group communication  
A communications device and method for secure group communications in a highly dynamic environment permits group members to be readily added or removed from the group without compromising...
US20100177886 INFORMATION SECURITY DEVICE  
To aim to provide an information security device capable of reducing a period necessary for performing a power operation used for secret communication or authentication. The information security...
US20090110187 METHOD AND APPARATUS FOR PROTECTING AN RSA CALCULATION ON AN OUTPUT BY MEANS OF THE CHINESE REMAINDER THEOREM  
An apparatus for protecting an RSA calculation of an output based on input values by means of the Chinese remainder theorem, the apparatus comprising for a first determining device adapted to...
US20130243185 AUDIO ENCRYPTION SYSTEMS AND METHODS WITH SECURE EDITING  
Encryption systems and methods for audio data, and more particularly, for complete audio encryption of recorded data for transmission, management, review, editing and modification or...
US20100034382 SIGNCRYPTION SCHEME BASED ON ELLIPTIC CURVE CRYPTOGRAPHY  
Embodiments include a method and a system for signcrypting data based on elliptic curve cryptography. In a head-end system data is encrypted using a random point R and digitally signed using the...
US20080123859 Method and system for encrypting and decrypting a transport stream using multiple algorithms  
There is provided a method for encrypting a data stream using multiple algorithms. In one embodiment, a first portion of the data stream is encrypted with a first algorithm utilizing a first key...
US20060056619 Method for universal calculation applied to points of an elliptic curve  
A method for universal calculation on the points of an elliptic curve defined by a quartic equation uses identical programmed calculating devices for operating an addition of points, a doubling of...
US20070160196 Protection against power anlysis attacks  
An electronic circuit for cryptographic processing, comprising a first combinatorial logical circuit, arranged to perform a first set of logical operations on input data and to produce output...
US20050157871 Encryption/signature method, apparatus, and program  
According to each embodiment of the present invention, random function operations less than three times and tight security can simultaneously be implemented. More specifically, a ciphertext y=c∥t...
US20090240955 SECURE MEDIA STORAGE DEVICE AND METHOD OF SECURING MEDIA STORAGE DEVICES  
A secure media storage device for an imaging device, comprising an interface (40) for receiving digital data, a memory (44) for storing the digital data and for allowing read out of the digital...