Match

Document 
Document Title 

US20120002803 
SELF RECONFIGURING VLSI ARCHITECTURES FOR UNKNOWN SECRET PHYSICAL FUNCTIONS BASED CRYPTO SECURITY SYSTEMS
This invention describes the use of the features of modern reconfigurable and selfreconfigurable VLSI technology to design highly secure unknown and secret physical functions for security... 

US20150010143 
SYSTEMS AND METHODS FOR SIGNATURE COMPUTATION IN A CONTENT LOCALITY BASED CACHE
The present disclosure relates to methods and circuits for signature computation in a content locality cache. A method can include dividing a received block into shingles, where each shingle... 

US20080137861 
Security Code Production Method and Methods of Using the Same, and Programmable Device Thereof
A method of producing a security code by means of a programmable user device is described. The security code produced represents in itself both the user and the user device. In one embodiment, a... 

US20130266135 
System for DNA Identification Hiding Personal Traits
A system for DNA sequence identification hides personal and medical characteristics. A DNA sequencer processes a biological sample to provide genetic data identifying biological sample genetic... 

US20150180652 
MODULAR EXPONENTIATION OPTIMIZATION FOR CRYPTOGRAPHIC SYSTEMS
A processing device, such as logic on an integrated circuit may identify a cryptographic message stored in a first register. The processing device may determine a plurality of components for a... 

US20120275594 
Method and Apparatus for Performing Elliptic Curve Scalar Multiplication in a Manner that Counters Power Analysis Attacks
When multiplicative splitting is used to hide a scalar in an Elliptic Curve scalar Multiplication ECSM operation, the associated modular division operation employs the known Almost Montgomery... 

US20120210120 
SELFENCRYPTION PROCESS
This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating... 

US20110069834 
Method and system for a symmetric block cipher using a plurality of symmetric algorithms
A method and system for hybrid encryption wherein all of the round function variables including the encryption algorithm change for each round. This permits the generation of block sizes and key... 

US20120082310 
CONTENT PROTECTION USING BLOCK REORDERING
An apparatus and method for protecting a content item such as a digitally encoded movie, an electronic programming guide, or the like, by reordering blocks of the content item prior to... 

US20110249815 
METHOD OF IMPLEMENTING A BLOCK CIPHER ALGORITHM
A method is provided of implementing a block cipher algorithm by a device storing a fixed initialization datum, comprising, before execution of a first iteration of the algorithm in the course of... 

US20140294174 
Efficient PrimeNumber Check
In a method for checking whether a value represents a prime number, for a cryptographic application, a Fermat test is carried out, which includes a modular exponentiation of a base with an... 

US20090003590 
MULTIDIMENSIONAL MONTGOMERY LADDERS FOR ELLIPTIC CURVES
An algorithm is provided having a matrix phase and point addition phase that permits computation of the combination of more than two point multiples. The algorithm has particular utility in... 

US20110033042 
Method for Generating a Temporally Threaded CMI Watermark
Disclosed is a method for generating a temporally threaded copyright management information watermark where fragile watermarks containing CMI are spread throughout a digital work temporally. In... 

US20110064215 
EXPONENT OBFUSCATION
A method of obfuscating an exponent is provided. The method comprises identifying a value λ for which it holds that λ>0 and x2=1 for a plurality of elements x which are to be used in a... 

US20120269341 
Method For Operating A Tachograph And Tachograph
A method for operating a tachograph having an application controller and a safety controller. A memory is associated with the application controller and a further memory is associated with the... 

US20100322414 
TERNARY AND HIGHER MULTIVALUE DIGITAL SCRAMBLERS/DESCRAMBLERS
Ternary (3value) and higher, multivalue digital scramblers/descramblers in digital communications. The method and apparatus of the present invention includes the creation of ternary (3value)... 

US20140185794 
ENCRYPTION PROCESSING APPARATUS AND METHOD
A device that uses homomorphic encryption is disclosed. The device obtains a first encrypted polynomial, a second encrypted polynomial, a first encrypted weight, and a second encrypted weight by... 

US20120148048 
METHOD FOR ENCRYPTING CONTENT, METHOD FOR DECRYPTING CONTENT AND ELECTRONIC APPARATUS APPLYING THE SAME
A method for encrypting content includes using a plurality of different encryption schemes to produce encrypted content. Encryption information is provided so as to indicate which of the plurality... 

US20110182419 
ENCRYPTION ALGORITHM WITH RANDOMIZED BUFFER
A system obtains a key and first and second plaintext, where the first plaintext is identical to the second plaintext. The system uses the key to encrypt the first plaintext to a first ciphertext... 

US20140153716 
WHITEBOX IMPLEMENTATION
A system for enabling a device to compute an outcome of an exponentiation Cx having a base C and/or an exponent x, the system comprising means for establishing a plurality of values λi; means for... 

US20110150213 
WHITEBOX IMPLEMENTATION
A system for enabling a device to compute an outcome of an exponentiation Cx having a base C and/or an exponent x, the system comprising means for establishing a plurality of values λi; means for... 

US20120237020 
METHODS FOR CUSTOMIZING A RIJNDAEL BLOCK CIPHER
A key variable loader receives a set of Rijndael parameters that were verified using a simulation computer, wherein the set of Rijndael parameters provide an input for implementing at least one... 

US20110033043 
TABLE MASKING FOR RESISTANCE TO POWER ANALYSIS ATTACKS
Tables are defined to permit output masking for table lookups to be carried out to resist power analysis attacks on cryptographic operations. A set of individually defined random values is used... 

US20140286488 
Determining a Division Remainder and Ascertaining Prime Number Candidates for a Cryptographic Application
A device and/or computer program uses a method including determining the division remainder of a first value (b) modulo a second value (p′) and executing a first Montgomery multiplication with the... 

US20120163587 
INTERGRATED CRYPTOGRAPHIC MODULE PROVIDING CONFIDENTIALITY AND INTEGRITY
An integrated cryptographic apparatus providing confidentiality and integrity includes an integrated cryptographic module including confidentiality and integrity. Further, the integrated... 

US20140126718 
COMPUTER PROGRAM PRODUCT AND METHOD FOR ORDER PRESERVING SYMBOL BASED ENCRYPTION
A method for processing symbols by a first computerized entity, the method may include receiving, by a first computerized entity and over a communication network, text that comprises multiple... 

US20120140920 
RNABASED CRYPTOGRAPHIC SYSTEM AND METHOD
The RNSbased cryptographic system and method uses a symmetric residue number system (RNS) for encryption and decryption of messages, i.e., the sender and receiver agree upon a set of relatively... 

US20130259224 
METHOD OF GENERATING A RANDOM PERMUTATION, RANDOM PERMUTATION GENERATING DEVICE, AND ENCRYPTION/DECRYPTION DEVICE HAVING THE SAME
Generating a random permutation by arranging a sequence N numbers in a matrix, performing random arrangement operations on the rows of the matrix to generate an intermediary matrix, performing... 

US20120039461 
EXPONENTIATION METHOD RESISTANT AGAINST SIDECHANNEL AND SAFEERROR ATTACKS
An exponentiation method resistant against sidechannel attacks and safeerror attacks. Input to the method is g in a multiplicatively written group G and a /digit exponent d with a radix m>1 and... 

US20120219148 
ENCRYPTION/DECRYPTION METHODS, AND DEVICES AND SYSTEMS USING THE SAME
An encryption/decryption device includes a control unit, an encryption/decryption unit and a verification unit. The control unit generates a start text and an encryption/decryption control signal... 

US20120250854 
CRYPTOGRAPHY CIRCUIT PROTECTED AGAINST OBSERVATION ATTACKS, IN PARTICULAR OF A HIGH ORDER
A cryptography circuit protected against observation attacks comprises at least one register R providing a variable x masked by the mask m, the masked variable being encrypted by a first... 

US20110200186 
Method of cipher block chaining using elliptic curve cryptography
The method of cipher block chaining using elliptic curve cryptography allows for the encryption of messages through elliptic curve cryptography and, particularly, with the performance of cipher... 

US20120089829 
Accelerating stream cipher operations using single and grid systems
Systems and methods for accelerating stream cipher encryption operations are described. In one aspect, a computerimplemented method receives data. The method separates the data into multiple file... 

US20110064216 
CRYPTOGRAPHIC MESSAGE SIGNATURE METHOD HAVING STRENGTHENED SECURITY, SIGNATURE VERIFICATION METHOD, AND CORRESPONDING DEVICES AND COMPUTER PROGRAM PRODUCTS
A cryptographic message signature method are provided, which have strengthened security. The method implements two sets of signature algorithms SA1={K1, S1, V1} and SA2={K2, S2, V2}, where Ki, Si... 

US20120224687 
Method and apparatus for optimizing Advanced Encryption Standard (AES) encryption and decryption in parallel modes of operation
The throughput of an encryption/decryption operation is increased in a system having a pipelined execution unit. Different independent encryptions (decryptions) of different data blocks may be... 

US20100040227 
Collaborative, Incremental Specification Of Identities
Methods and systems for collaborative, incremental specification of identities are provided. Users of an information processing system collaborate to define and refine identities of entities, and... 

US20100306221 
EXTENDING RANDOM NUMBER SUMMATION AS AN ORDERPRESERVING ENCRYPTION SCHEME
A method and system for cryptographically indexing, searching for, and retrieving documents is provided. In some embodiments, an encryption system is provided that generates a document index that... 

US20060067525 
Unique product identification
The components of a product are identified with the aid of checksums. The checksums are in turn identified with the aid of a master checksum. Asymmetrically encrypted digital signatures are... 

US20110013768 
SYSTEM AND METHOD FOR REDUCING THE COMPUTATION AND STORAGE REQUIREMENTS FOR A MONTGOMERYSTYLE REDUCTION
A system and method are described that provide an alternative way in which to produce a Montgomery reduction from below by storing a new precomputed value used to substantially replace the μ and n... 

US20100064354 
MAIDSAFE.NET
This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating... 

US20120213358 
Digital Random Number Generator Based on DigitallyControlled Oscillators
A system for random number generation includes a digital oscillator circuit, which has a set of available configurations and is operative to generate a random number sequence in accordance with a... 

US20120045051 
PAIRING COMPUTATION DEVICE, PAIRING COMPUTATION METHOD AND RECORDING MEDIUM STORING PAIRING COMPUTATION PROGRAM
There is provided a pairing computation device provided with a CPU which computes pairing e (S, Q) with S∈G1, Q∈G2, χ being a given integer variable, and F being a rational function calculated... 

US20100005299 
METHOD FOR MANUFACTURING A PRODUCT, SYSTEM FOR MANUFACTURING A PRODUCT, AND PRODUCT
Provided is a product on which is imprinted an encrypted message obtained by encrypting a message sent along with the product from a sender to a recipient, a method for manufacturing the product,... 

US20110200188 
Method of performing cipher block chaining using elliptic polynomial cryptography
The method of performing cipher block chaining using elliptic polynomial cryptography allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the... 

US20150023496 
PAIRING COMPUTATION APPARATUS, PAIRING COMPUTATION METHOD, AND COMPUTER PROGRAM PRODUCT
According to an embodiment, a pairing computation apparatus receives two points on a predetermined elliptic curve defined on a finite field, and outputs a pairing value that is an element on an... 

US20130070922 
TECHNIQUE FOR SECURELY COMMUNICATING AND STORING PROGRAMMING MATERIAL IN A TRUSTED DOMAIN
A “trusted domain” is established within which content received from a communications network, e.g., a cable TV network, is protected from unauthorized copying thereof, in accordance with the... 

US20150249535 
RESISTANCE TO CACHE TIMING ATTACKS ON BLOCK CIPHER ENCRYPTION
Technology is generally described for improving resistance to cache timing attacks made on block cipher encryption implementations. In some examples, the technology can include identifying one or... 

US20110004607 
TECHNIQUES FOR REPRESENTING KEYWORDS IN AN ENCRYPTED SEARCH INDEX TO PREVENT HISTOGRAMBASED ATTACKS
A method and system for cryptographically indexing, searching for, and retrieving documents is provided. In some embodiments, an encryption system is provided that generates a document index that... 

US20110051927 
DEVICE FOR GENERATING A MESSAGE AUTHENTICATION CODE FOR AUTHENTICATING A MESSAGE
Device for generating a message authentication code for authenticating a message, wherein the message is divided in blocks (M) with a specified block length, the device comprising a generating... 

US20110274269 
ENCODING POINTS OF AN ELLIPTIC CURVE
The method comprises, in an electronic component, carrying out a cryptographic calculation that includes the step of obtaining points P on an elliptic curve following the equation... 