Match Document Document Title
US20150172053 METHOD FOR CONVERTING A CONDITIONAL ACCESS CONTENT AND RECEIVER FOR THE IMPLEMENTATION FOR SAID METHOD  
A method is disclosed for converting a conditional access content. This method includes receiving, by a cryptographic module of a first receiver, the content encrypted according to the first...
US20150098563 Generating Multiple Secure Hashes from a Single Data Buffer  
One embodiment provides an apparatus. The apparatus includes a single instruction multiple data (SIMD) hash module configured to apportion at least a first portion of a message of length L to a...
US20110170685 COUNTERMEASURE METHOD AND DEVICES FOR ASYMMETRIC ENCRYPTION WITH SIGNATURE SCHEME  
A countermeasure method in an electronic component implementing an asymmetric private key encryption algorithm includes generating a first output data, using a primitive, and a protection...
US20140093069 INSTRUCTION SET FOR MESSAGE SCHEDULING OF SHA256 ALGORITHM  
A processor includes a first execution unit to receive and execute a first instruction to process a first part of secure hash algorithm 256 (SHA256) message scheduling operations, the first...
US20080044010 Cryptographic system and method for encrypting input data  
A cryptographic system and method for encrypting input data, in which an example system includes a table calculator configured to calculate table values composed of one of scalar multiplication...
US20060072745 Encryption system using device authentication keys  
An encrypted data distributing method includes preparing cipher text which can be decrypted only by a specific trusted device, and performing encryption and decryption processing at a high speed....
US20140341373 METHOD OF GENERATING MESSAGE AUTHENTICATION CODE AND AUTHENTICATION DEVICE AND AUTHENTICATION REQUEST DEVICE USING THE METHOD  
Provided are a method of generating a message authentication code and an authentication device and an authentication request device using the method. The method includes generating a second secret...
US20100046742 APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PERFORMING DATA COMPRESSION PROCESSING USING ALGEBRAIC TORUS  
An encryption processing unit executes an arithmetic operation decided in advance and outputs an arithmetic result as an element on an algebraic torus. A compressing unit outputs, when the...
US20060062384 Method and apparatus for generating large numbers of encryption keys  
Entropy obtained from a series of key generation exchanges may be combined with entropy from a strong entropy source to allow the strong entropy to be stretched to generate a larger number of keys...
US20150222433 METHOD AND APPARATUS FOR DISABLING ALGORITHMS IN A DEVICE  
An apparatus for enabling removal or disabling of weak algorithms may include a processor and memory storing executable computer program code that cause the apparatus to at least perform...
US20060008082 System and method for securing communications between devices  
A system and method for providing an improved way to secure messages being transmitted between communicating devices. Security mechanisms, operating below the session establishment level, provide...
US20100260333 PAIRING COMPUTATION DEVICE, PAIRING COMPUTATION METHOD AND RECORDING MEDIUM RECORDING PAIRING COMPUTATION PROGRAM  
There is provided a pairing computation device, a pairing computation method and a recording medium recording a pairing computation program all enabling a pairing computation at high speed. In the...
US20080144822 Method for local conditional access for mobile equipments  
In one embodiment of the present invention, a method is disclosed for conditional access to a digital data stream encrypted with at least one first control word and broadcasted via an emitter of a...
US20140177823 METHODS, SYSTEMS AND APPARATUS TO REDUCE PROCESSOR DEMANDS DURING ENCRYPTION  
Methods and apparatus are disclosed to reduce processor demands during encryption. A disclosed example method includes detecting a request for the processor to execute an encryption cipher...
US20090323956 ENCRYPTION DEVICE, PROGRAM, AND METHOD  
Disclosed is an encryption device for generating a pseudo-random number based on a secret key and generates an encrypted text by applying the pseudo-random number sequence to a plain text, uses,...
US20060159257 Apparatus and method for detecting a potential attack on a cryptographic calculation  
An apparatus for detecting a potential attack on a crypto-graphic calculation performing a calculation with at least one parameter includes first means for providing a parameter masked according...
US20080137837 Encryption method for message authentication  
In an encryption method, an input block of data is reversibly processed to produce a string that is at least partially randomized. The randomized string is then encrypted by a block cipher. In...
US20100191971 METHODS AND APPARATUS FOR LAYER 2 AND LAYER 3 SECURITY BETWEEN WIRELESS TERMINATION POINTS  
A method is provided for both layer 2 (L2) and layer 3 (L3) security in the context, for example, of a WISP-e protocol. An AES algorithm in CBC mode is used for encryption and decryption of the...
US20130236006 METHOD FOR ARBITRARY-PRECISION DIVISION OR MODULAR REDUCTION  
A method in a portable data carrier for executing a cryptographic operation on security-relevant data comprises a step of determining a remainder (r) of a dividend (a) modulo a divisor (b). In so...
US20130168450 FORMAT PRESERVING CIPHER SYSTEM AND METHOD  
Systems and methods for enciphering data are provided. In one embodiment, information is enciphered using a variable block length cipher that returns the encrypted symbol set in any defined symbol...
US20050036607 Pseudo-random number generation based on periodic sampling of one or more linear feedback shift registers  
One or more methods and systems of generating pseudo-random numbers that are used as encryption keys in cryptographic applications are presented. In one embodiment, a method of generating...
US20060083369 Method and apparatus for sharing and generating system key in DRM system  
A method and apparatus are provided for generating and sharing a system key over a DRM system. The method includes: defining a (k−1)th order polynomial having k random numbers as coefficients,...
US20080137841 Protecting Sensitive Data Associations  
Sensitive data associations for related data values are protected. A set of related data values is received. The set of related data values include at least a first data value and a second data...
US20120257742 Efficient Implementation of Hash Algorithm on a Processor  
An efficient implementation of SHA-512, and similarly SHA-384, on an ARM processor. The implementation maximizes reuse of the register values between iterations so as to minimize the need to load...
US20110158400 COOPERATIVE ENCODING OF DATA BY PLURALITIES OF PARTIES  
Methods and apparatus include cooperatively encoding digital data between collaborating parties. By prior agreement, the parties take turns encoding portions of a given payload (e.g., document),...
US20100183147 ASYMMETRICAL METHOD OF ENCRYPTION OR SIGNATURE VERIFICATION  
The invention proposes a method and a device for decrypting an encrypted message represented by a sequence C or applying an electronic signature to a sequence C, said sequence C consisting of data...
US20080304657 Secure Threshold Decryption Protocol Computation  
The present invention relates to a method of converting an encrypted data set into an encryption of individual bits representing the data set. Further, the invention relates to a system for...
US20050047592 Single-round enciphering apparatus and method using a reduced number of elements in a mobile communication system  
An enciphering apparatus and method divide an input bit stream with length 2n into first and second sub-bit streams with length n, perform an enciphering procedure, and output an enciphered bit...
US20100086126 ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, AND INTEGRATED CIRCUIT  
There has been a problem that the maximum number of logical steps increases and processing speed decreases when a masking method in which S-Box is implemented using an inverse element calculation...
US20050226409 Method of improving operational speed of encryption engine  
In the present method of implementing functioning of an encryption engine, a plurality of logic blocks are provided, each for running a function. Each function is run based on three variables,...
US20070253548 Data protection system, method, and program  
The data dividing unit divides data into n pieces. An encoding unit generates m pieces of encoded data composed of a set of a bitmap matrix specifying a plurality pieces of divided data for...
US20070177724 Data transmitter and data receiver  
A data communication apparatus which causes the eavesdropper to take a significantly increased time to analyze a cipher text and provides high concealability is provided. A multi-level code...
US20080159526 Architecture and instruction set for implementing advanced encryption standard (AES)  
A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A...
US20100135485 SYSTEM FOR AUTHENTICATING OBJECTS  
A system for authenticating an object is disclosed. The system has a sensing device for sensing coded tags printed on the object. Each coded tags encodes an identity of the object and a signature...
US20080040603 MULTIPLE LEVEL SECURITY SYSTEM AND METHOD FOR ENCRYPTING DATA WITHIN DOCUMENTS  
A multiple level security system and method for encrypting data within documents is disclosed. The method includes one or more different encryption algorithms, and can employ the one or more...
US20090172419 DATA STORAGE DEVICE, MANAGEMENT SERVER, INTEGRATED CIRCUIT, DATA UPDATE SYSTEM, HOME ELECTRIC APPARATUSES, DATA UPDATE METHOD, ENCRYPTION METHOD, AND ENCRYPTION/DECRYPTION KEY GENERATION METHOD  
Provided is a data storage device capable of safely and effectively updating software of a home electric apparatus. In the home electric apparatus (100) in which currently used data is to be...
US20080114994 METHOD AND SYSTEM TO PROVIDE SECURITY IMPLEMENTATION FOR STORAGE DEVICES  
In one embodiment, method that can be performed on a system, is provided to security implementations for storage devices. In one embodiment, the method comprises providing a separate encryption...
US20070147605 System and Method for Authenticating Software Using Protected Master Key  
A processing unit includes a read-only encryption key. Software is loaded into a system memory area from a non-volatile storage device. Software code image that resides in the system storage area...
US20090129585 Exclusive encryption system  
An encryption system includes a plurality of encryption operations including individual encryption operations and group encryption operations available for application in the encryption of data....
US20100158247 METHOD AND SYSTEM FOR SECURE STORAGE, TRANSMISSION AND CONTROL OF CRYPTOGRAPHIC KEYS  
A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or...
US20090138948 System and method for over the air communication authentication using a device token  
A system and method are described for securing over the air communications between a service and a communication device. For example, one embodiment of a method for creating a security token on a...
US20080279368 Low-Latency Method And Apparatus Of Ghash Operation For Authenticated Encryption Galois Counter Mode  
Disclosed is a low-latency method and apparatus of GHASH operation for authenticated encryption Galois Counter Mode (GCM), which simultaneously computes three interim values respectively yielded...
US20100166174 Hash functions using elliptic curve cryptography  
The hash functions using elliptic curve cryptography are hash functions that are produced using both an elliptic curve and a twist of the elliptic curve. Hash points are assigned values that...
US20100195821 APPARATUS FOR CALCULATING A RESULT OF A SCALAR MULTIPLICATION  
An apparatus for calculating a result of a scalar multiplication of a reference number with a reference point on an elliptic curve comprises a point selector and a processor. The point selector is...
US20110123020 ENDECRYPTOR CAPABLE OF PERFORMING PARALLEL PROCESSING AND ENCRYPTION/DECRYPTION METHOD THEREOF  
An encryption/decryption method of an endecryptor including a plurality of endecryption units supporting an XES mode with tweak and ciphertext streaming (XTS) includes dividing an input data...
US20070223686 Methods and apparatus for data and signal encryption and decryption by irregular subspace leaping  
A data/signal encryption/scrambling and decryption system and methods for constructing said system from irregular subspace leaping. A data/signal is mounted from the first/previous subspace to the...
US20120300922 METHOD OF GENERATING A CORRESPONDENCE TABLE FOR A CRYPTOGRAPHIC WHITE BOX  
A method is provided for generating a correspondence table suitable for use in a cryptographic processing method and comprising storing a plurality of input data and of output data in the table,...
US20100235644 Method and System for a Recursive Security Protocol for Digital Copyright Control  
Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and...
US20100125728 METHOD OF IMPLEMENTING ONE WAY HASH FUNCTIONS AND APPARATUS THEREFOR  
A cryptographic system for encrypting a data stream to be transported over a network by using a one way hash function constructed according to Merkle-Damgard construction includes a plurality of...
US20060198514 System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys  
A system for authentication, encryption and/or signing, as well as corresponding devices and methods, that use temporary but repeatable encryption keys uniquely connected to the user and generated...