Match

Document 
Document Title 

US20150172053 
METHOD FOR CONVERTING A CONDITIONAL ACCESS CONTENT AND RECEIVER FOR THE IMPLEMENTATION FOR SAID METHOD
A method is disclosed for converting a conditional access content. This method includes receiving, by a cryptographic module of a first receiver, the content encrypted according to the first... 

US20150098563 
Generating Multiple Secure Hashes from a Single Data Buffer
One embodiment provides an apparatus. The apparatus includes a single instruction multiple data (SIMD) hash module configured to apportion at least a first portion of a message of length L to a... 

US20110170685 
COUNTERMEASURE METHOD AND DEVICES FOR ASYMMETRIC ENCRYPTION WITH SIGNATURE SCHEME
A countermeasure method in an electronic component implementing an asymmetric private key encryption algorithm includes generating a first output data, using a primitive, and a protection... 

US20140093069 
INSTRUCTION SET FOR MESSAGE SCHEDULING OF SHA256 ALGORITHM
A processor includes a first execution unit to receive and execute a first instruction to process a first part of secure hash algorithm 256 (SHA256) message scheduling operations, the first... 

US20080044010 
Cryptographic system and method for encrypting input data
A cryptographic system and method for encrypting input data, in which an example system includes a table calculator configured to calculate table values composed of one of scalar multiplication... 

US20060072745 
Encryption system using device authentication keys
An encrypted data distributing method includes preparing cipher text which can be decrypted only by a specific trusted device, and performing encryption and decryption processing at a high speed.... 

US20140341373 
METHOD OF GENERATING MESSAGE AUTHENTICATION CODE AND AUTHENTICATION DEVICE AND AUTHENTICATION REQUEST DEVICE USING THE METHOD
Provided are a method of generating a message authentication code and an authentication device and an authentication request device using the method. The method includes generating a second secret... 

US20100046742 
APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PERFORMING DATA COMPRESSION PROCESSING USING ALGEBRAIC TORUS
An encryption processing unit executes an arithmetic operation decided in advance and outputs an arithmetic result as an element on an algebraic torus. A compressing unit outputs, when the... 

US20060062384 
Method and apparatus for generating large numbers of encryption keys
Entropy obtained from a series of key generation exchanges may be combined with entropy from a strong entropy source to allow the strong entropy to be stretched to generate a larger number of keys... 

US20150222433 
METHOD AND APPARATUS FOR DISABLING ALGORITHMS IN A DEVICE
An apparatus for enabling removal or disabling of weak algorithms may include a processor and memory storing executable computer program code that cause the apparatus to at least perform... 

US20060008082 
System and method for securing communications between devices
A system and method for providing an improved way to secure messages being transmitted between communicating devices. Security mechanisms, operating below the session establishment level, provide... 

US20100260333 
PAIRING COMPUTATION DEVICE, PAIRING COMPUTATION METHOD AND RECORDING MEDIUM RECORDING PAIRING COMPUTATION PROGRAM
There is provided a pairing computation device, a pairing computation method and a recording medium recording a pairing computation program all enabling a pairing computation at high speed. In the... 

US20080144822 
Method for local conditional access for mobile equipments
In one embodiment of the present invention, a method is disclosed for conditional access to a digital data stream encrypted with at least one first control word and broadcasted via an emitter of a... 

US20140177823 
METHODS, SYSTEMS AND APPARATUS TO REDUCE PROCESSOR DEMANDS DURING ENCRYPTION
Methods and apparatus are disclosed to reduce processor demands during encryption. A disclosed example method includes detecting a request for the processor to execute an encryption cipher... 

US20090323956 
ENCRYPTION DEVICE, PROGRAM, AND METHOD
Disclosed is an encryption device for generating a pseudorandom number based on a secret key and generates an encrypted text by applying the pseudorandom number sequence to a plain text, uses,... 

US20060159257 
Apparatus and method for detecting a potential attack on a cryptographic calculation
An apparatus for detecting a potential attack on a cryptographic calculation performing a calculation with at least one parameter includes first means for providing a parameter masked according... 

US20080137837 
Encryption method for message authentication
In an encryption method, an input block of data is reversibly processed to produce a string that is at least partially randomized. The randomized string is then encrypted by a block cipher. In... 

US20100191971 
METHODS AND APPARATUS FOR LAYER 2 AND LAYER 3 SECURITY BETWEEN WIRELESS TERMINATION POINTS
A method is provided for both layer 2 (L2) and layer 3 (L3) security in the context, for example, of a WISPe protocol. An AES algorithm in CBC mode is used for encryption and decryption of the... 

US20130236006 
METHOD FOR ARBITRARYPRECISION DIVISION OR MODULAR REDUCTION
A method in a portable data carrier for executing a cryptographic operation on securityrelevant data comprises a step of determining a remainder (r) of a dividend (a) modulo a divisor (b). In so... 

US20130168450 
FORMAT PRESERVING CIPHER SYSTEM AND METHOD
Systems and methods for enciphering data are provided. In one embodiment, information is enciphered using a variable block length cipher that returns the encrypted symbol set in any defined symbol... 

US20050036607 
Pseudorandom number generation based on periodic sampling of one or more linear feedback shift registers
One or more methods and systems of generating pseudorandom numbers that are used as encryption keys in cryptographic applications are presented. In one embodiment, a method of generating... 

US20060083369 
Method and apparatus for sharing and generating system key in DRM system
A method and apparatus are provided for generating and sharing a system key over a DRM system. The method includes: defining a (k−1)th order polynomial having k random numbers as coefficients,... 

US20080137841 
Protecting Sensitive Data Associations
Sensitive data associations for related data values are protected. A set of related data values is received. The set of related data values include at least a first data value and a second data... 

US20120257742 
Efficient Implementation of Hash Algorithm on a Processor
An efficient implementation of SHA512, and similarly SHA384, on an ARM processor. The implementation maximizes reuse of the register values between iterations so as to minimize the need to load... 

US20110158400 
COOPERATIVE ENCODING OF DATA BY PLURALITIES OF PARTIES
Methods and apparatus include cooperatively encoding digital data between collaborating parties. By prior agreement, the parties take turns encoding portions of a given payload (e.g., document),... 

US20100183147 
ASYMMETRICAL METHOD OF ENCRYPTION OR SIGNATURE VERIFICATION
The invention proposes a method and a device for decrypting an encrypted message represented by a sequence C or applying an electronic signature to a sequence C, said sequence C consisting of data... 

US20080304657 
Secure Threshold Decryption Protocol Computation
The present invention relates to a method of converting an encrypted data set into an encryption of individual bits representing the data set. Further, the invention relates to a system for... 

US20050047592 
Singleround enciphering apparatus and method using a reduced number of elements in a mobile communication system
An enciphering apparatus and method divide an input bit stream with length 2n into first and second subbit streams with length n, perform an enciphering procedure, and output an enciphered bit... 

US20100086126 
ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, AND INTEGRATED CIRCUIT
There has been a problem that the maximum number of logical steps increases and processing speed decreases when a masking method in which SBox is implemented using an inverse element calculation... 

US20050226409 
Method of improving operational speed of encryption engine
In the present method of implementing functioning of an encryption engine, a plurality of logic blocks are provided, each for running a function. Each function is run based on three variables,... 

US20070253548 
Data protection system, method, and program
The data dividing unit divides data into n pieces. An encoding unit generates m pieces of encoded data composed of a set of a bitmap matrix specifying a plurality pieces of divided data for... 

US20070177724 
Data transmitter and data receiver
A data communication apparatus which causes the eavesdropper to take a significantly increased time to analyze a cipher text and provides high concealability is provided. A multilevel code... 

US20080159526 
Architecture and instruction set for implementing advanced encryption standard (AES)
A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A... 

US20100135485 
SYSTEM FOR AUTHENTICATING OBJECTS
A system for authenticating an object is disclosed. The system has a sensing device for sensing coded tags printed on the object. Each coded tags encodes an identity of the object and a signature... 

US20080040603 
MULTIPLE LEVEL SECURITY SYSTEM AND METHOD FOR ENCRYPTING DATA WITHIN DOCUMENTS
A multiple level security system and method for encrypting data within documents is disclosed. The method includes one or more different encryption algorithms, and can employ the one or more... 

US20090172419 
DATA STORAGE DEVICE, MANAGEMENT SERVER, INTEGRATED CIRCUIT, DATA UPDATE SYSTEM, HOME ELECTRIC APPARATUSES, DATA UPDATE METHOD, ENCRYPTION METHOD, AND ENCRYPTION/DECRYPTION KEY GENERATION METHOD
Provided is a data storage device capable of safely and effectively updating software of a home electric apparatus. In the home electric apparatus (100) in which currently used data is to be... 

US20080114994 
METHOD AND SYSTEM TO PROVIDE SECURITY IMPLEMENTATION FOR STORAGE DEVICES
In one embodiment, method that can be performed on a system, is provided to security implementations for storage devices. In one embodiment, the method comprises providing a separate encryption... 

US20070147605 
System and Method for Authenticating Software Using Protected Master Key
A processing unit includes a readonly encryption key. Software is loaded into a system memory area from a nonvolatile storage device. Software code image that resides in the system storage area... 

US20090129585 
Exclusive encryption system
An encryption system includes a plurality of encryption operations including individual encryption operations and group encryption operations available for application in the encryption of data.... 

US20100158247 
METHOD AND SYSTEM FOR SECURE STORAGE, TRANSMISSION AND CONTROL OF CRYPTOGRAPHIC KEYS
A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or... 

US20090138948 
System and method for over the air communication authentication using a device token
A system and method are described for securing over the air communications between a service and a communication device. For example, one embodiment of a method for creating a security token on a... 

US20080279368 
LowLatency Method And Apparatus Of Ghash Operation For Authenticated Encryption Galois Counter Mode
Disclosed is a lowlatency method and apparatus of GHASH operation for authenticated encryption Galois Counter Mode (GCM), which simultaneously computes three interim values respectively yielded... 

US20100166174 
Hash functions using elliptic curve cryptography
The hash functions using elliptic curve cryptography are hash functions that are produced using both an elliptic curve and a twist of the elliptic curve. Hash points are assigned values that... 

US20100195821 
APPARATUS FOR CALCULATING A RESULT OF A SCALAR MULTIPLICATION
An apparatus for calculating a result of a scalar multiplication of a reference number with a reference point on an elliptic curve comprises a point selector and a processor. The point selector is... 

US20110123020 
ENDECRYPTOR CAPABLE OF PERFORMING PARALLEL PROCESSING AND ENCRYPTION/DECRYPTION METHOD THEREOF
An encryption/decryption method of an endecryptor including a plurality of endecryption units supporting an XES mode with tweak and ciphertext streaming (XTS) includes dividing an input data... 

US20070223686 
Methods and apparatus for data and signal encryption and decryption by irregular subspace leaping
A data/signal encryption/scrambling and decryption system and methods for constructing said system from irregular subspace leaping. A data/signal is mounted from the first/previous subspace to the... 

US20120300922 
METHOD OF GENERATING A CORRESPONDENCE TABLE FOR A CRYPTOGRAPHIC WHITE BOX
A method is provided for generating a correspondence table suitable for use in a cryptographic processing method and comprising storing a plurality of input data and of output data in the table,... 

US20100235644 
Method and System for a Recursive Security Protocol for Digital Copyright Control
Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and... 

US20100125728 
METHOD OF IMPLEMENTING ONE WAY HASH FUNCTIONS AND APPARATUS THEREFOR
A cryptographic system for encrypting a data stream to be transported over a network by using a one way hash function constructed according to MerkleDamgard construction includes a plurality of... 

US20060198514 
System, portable device and method for digital authenticating, crypting and signing by generating shortlived cryptokeys
A system for authentication, encryption and/or signing, as well as corresponding devices and methods, that use temporary but repeatable encryption keys uniquely connected to the user and generated... 