Match Document Document Title
US20120002803 SELF RECONFIGURING VLSI ARCHITECTURES FOR UNKNOWN SECRET PHYSICAL FUNCTIONS BASED CRYPTO SECURITY SYSTEMS  
This invention describes the use of the features of modern reconfigurable and self-reconfigurable VLSI technology to design highly secure unknown and secret physical functions for security...
US20150010143 SYSTEMS AND METHODS FOR SIGNATURE COMPUTATION IN A CONTENT LOCALITY BASED CACHE  
The present disclosure relates to methods and circuits for signature computation in a content locality cache. A method can include dividing a received block into shingles, where each shingle...
US20080137861 Security Code Production Method and Methods of Using the Same, and Programmable Device Thereof  
A method of producing a security code by means of a programmable user device is described. The security code produced represents in itself both the user and the user device. In one embodiment, a...
US20130266135 System for DNA Identification Hiding Personal Traits  
A system for DNA sequence identification hides personal and medical characteristics. A DNA sequencer processes a biological sample to provide genetic data identifying biological sample genetic...
US20150180652 MODULAR EXPONENTIATION OPTIMIZATION FOR CRYPTOGRAPHIC SYSTEMS  
A processing device, such as logic on an integrated circuit may identify a cryptographic message stored in a first register. The processing device may determine a plurality of components for a...
US20120275594 Method and Apparatus for Performing Elliptic Curve Scalar Multiplication in a Manner that Counters Power Analysis Attacks  
When multiplicative splitting is used to hide a scalar in an Elliptic Curve scalar Multiplication ECSM operation, the associated modular division operation employs the known Almost Montgomery...
US20120210120 SELF-ENCRYPTION PROCESS  
This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating...
US20110069834 Method and system for a symmetric block cipher using a plurality of symmetric algorithms  
A method and system for hybrid encryption wherein all of the round function variables including the encryption algorithm change for each round. This permits the generation of block sizes and key...
US20120082310 CONTENT PROTECTION USING BLOCK REORDERING  
An apparatus and method for protecting a content item such as a digitally encoded movie, an electronic programming guide, or the like, by reordering blocks of the content item prior to...
US20110249815 METHOD OF IMPLEMENTING A BLOCK CIPHER ALGORITHM  
A method is provided of implementing a block cipher algorithm by a device storing a fixed initialization datum, comprising, before execution of a first iteration of the algorithm in the course of...
US20140294174 Efficient Prime-Number Check  
In a method for checking whether a value represents a prime number, for a cryptographic application, a Fermat test is carried out, which includes a modular exponentiation of a base with an...
US20090003590 MULTI-DIMENSIONAL MONTGOMERY LADDERS FOR ELLIPTIC CURVES  
An algorithm is provided having a matrix phase and point addition phase that permits computation of the combination of more than two point multiples. The algorithm has particular utility in...
US20110033042 Method for Generating a Temporally Threaded CMI Watermark  
Disclosed is a method for generating a temporally threaded copyright management information watermark where fragile watermarks containing CMI are spread throughout a digital work temporally. In...
US20110064215 EXPONENT OBFUSCATION  
A method of obfuscating an exponent is provided. The method comprises identifying a value λ for which it holds that λ>0 and x2=1 for a plurality of elements x which are to be used in a...
US20120269341 Method For Operating A Tachograph And Tachograph  
A method for operating a tachograph having an application controller and a safety controller. A memory is associated with the application controller and a further memory is associated with the...
US20100322414 TERNARY AND HIGHER MULTI-VALUE DIGITAL SCRAMBLERS/DESCRAMBLERS  
Ternary (3-value) and higher, multi-value digital scramblers/descramblers in digital communications. The method and apparatus of the present invention includes the creation of ternary (3-value)...
US20140185794 ENCRYPTION PROCESSING APPARATUS AND METHOD  
A device that uses homomorphic encryption is disclosed. The device obtains a first encrypted polynomial, a second encrypted polynomial, a first encrypted weight, and a second encrypted weight by...
US20120148048 METHOD FOR ENCRYPTING CONTENT, METHOD FOR DECRYPTING CONTENT AND ELECTRONIC APPARATUS APPLYING THE SAME  
A method for encrypting content includes using a plurality of different encryption schemes to produce encrypted content. Encryption information is provided so as to indicate which of the plurality...
US20110182419 ENCRYPTION ALGORITHM WITH RANDOMIZED BUFFER  
A system obtains a key and first and second plaintext, where the first plaintext is identical to the second plaintext. The system uses the key to encrypt the first plaintext to a first ciphertext...
US20140153716 WHITE-BOX IMPLEMENTATION  
A system for enabling a device to compute an outcome of an exponentiation Cx having a base C and/or an exponent x, the system comprising means for establishing a plurality of values λi; means for...
US20110150213 WHITE-BOX IMPLEMENTATION  
A system for enabling a device to compute an outcome of an exponentiation Cx having a base C and/or an exponent x, the system comprising means for establishing a plurality of values λi; means for...
US20120237020 METHODS FOR CUSTOMIZING A RIJNDAEL BLOCK CIPHER  
A key variable loader receives a set of Rijndael parameters that were verified using a simulation computer, wherein the set of Rijndael parameters provide an input for implementing at least one...
US20110033043 TABLE MASKING FOR RESISTANCE TO POWER ANALYSIS ATTACKS  
Tables are defined to permit output masking for table look-ups to be carried out to resist power analysis attacks on cryptographic operations. A set of individually defined random values is used...
US20140286488 Determining a Division Remainder and Ascertaining Prime Number Candidates for a Cryptographic Application  
A device and/or computer program uses a method including determining the division remainder of a first value (b) modulo a second value (p′) and executing a first Montgomery multiplication with the...
US20120163587 INTERGRATED CRYPTOGRAPHIC MODULE PROVIDING CONFIDENTIALITY AND INTEGRITY  
An integrated cryptographic apparatus providing confidentiality and integrity includes an integrated cryptographic module including confidentiality and integrity. Further, the integrated...
US20140126718 COMPUTER PROGRAM PRODUCT AND METHOD FOR ORDER PRESERVING SYMBOL BASED ENCRYPTION  
A method for processing symbols by a first computerized entity, the method may include receiving, by a first computerized entity and over a communication network, text that comprises multiple...
US20120140920 RNA-BASED CRYPTOGRAPHIC SYSTEM AND METHOD  
The RNS-based cryptographic system and method uses a symmetric residue number system (RNS) for encryption and decryption of messages, i.e., the sender and receiver agree upon a set of relatively...
US20130259224 METHOD OF GENERATING A RANDOM PERMUTATION, RANDOM PERMUTATION GENERATING DEVICE, AND ENCRYPTION/DECRYPTION DEVICE HAVING THE SAME  
Generating a random permutation by arranging a sequence N numbers in a matrix, performing random arrangement operations on the rows of the matrix to generate an intermediary matrix, performing...
US20120039461 EXPONENTIATION METHOD RESISTANT AGAINST SIDE-CHANNEL AND SAFE-ERROR ATTACKS  
An exponentiation method resistant against side-channel attacks and safe-error attacks. Input to the method is g in a multiplicatively written group G and a /-digit exponent d with a radix m>1 and...
US20120219148 ENCRYPTION/DECRYPTION METHODS, AND DEVICES AND SYSTEMS USING THE SAME  
An encryption/decryption device includes a control unit, an encryption/decryption unit and a verification unit. The control unit generates a start text and an encryption/decryption control signal...
US20120250854 CRYPTOGRAPHY CIRCUIT PROTECTED AGAINST OBSERVATION ATTACKS, IN PARTICULAR OF A HIGH ORDER  
A cryptography circuit protected against observation attacks comprises at least one register R providing a variable x masked by the mask m, the masked variable being encrypted by a first...
US20110200186 Method of cipher block chaining using elliptic curve cryptography  
The method of cipher block chaining using elliptic curve cryptography allows for the encryption of messages through elliptic curve cryptography and, particularly, with the performance of cipher...
US20120089829 Accelerating stream cipher operations using single and grid systems  
Systems and methods for accelerating stream cipher encryption operations are described. In one aspect, a computer-implemented method receives data. The method separates the data into multiple file...
US20110064216 CRYPTOGRAPHIC MESSAGE SIGNATURE METHOD HAVING STRENGTHENED SECURITY, SIGNATURE VERIFICATION METHOD, AND CORRESPONDING DEVICES AND COMPUTER PROGRAM PRODUCTS  
A cryptographic message signature method are provided, which have strengthened security. The method implements two sets of signature algorithms SA1={K1, S1, V1} and SA2={K2, S2, V2}, where Ki, Si...
US20120224687 Method and apparatus for optimizing Advanced Encryption Standard (AES) encryption and decryption in parallel modes of operation  
The throughput of an encryption/decryption operation is increased in a system having a pipelined execution unit. Different independent encryptions (decryptions) of different data blocks may be...
US20100040227 Collaborative, Incremental Specification Of Identities  
Methods and systems for collaborative, incremental specification of identities are provided. Users of an information processing system collaborate to define and refine identities of entities, and...
US20100306221 EXTENDING RANDOM NUMBER SUMMATION AS AN ORDER-PRESERVING ENCRYPTION SCHEME  
A method and system for cryptographically indexing, searching for, and retrieving documents is provided. In some embodiments, an encryption system is provided that generates a document index that...
US20060067525 Unique product identification  
The components of a product are identified with the aid of checksums. The checksums are in turn identified with the aid of a master checksum. Asymmetrically encrypted digital signatures are...
US20110013768 SYSTEM AND METHOD FOR REDUCING THE COMPUTATION AND STORAGE REQUIREMENTS FOR A MONTGOMERY-STYLE REDUCTION  
A system and method are described that provide an alternative way in which to produce a Montgomery reduction from below by storing a new precomputed value used to substantially replace the μ and n...
US20100064354 MAIDSAFE.NET  
This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating...
US20120213358 Digital Random Number Generator Based on Digitally-Controlled Oscillators  
A system for random number generation includes a digital oscillator circuit, which has a set of available configurations and is operative to generate a random number sequence in accordance with a...
US20120045051 PAIRING COMPUTATION DEVICE, PAIRING COMPUTATION METHOD AND RECORDING MEDIUM STORING PAIRING COMPUTATION PROGRAM  
There is provided a pairing computation device provided with a CPU which computes pairing e (S, Q) with S∈G1, Q∈G2, χ being a given integer variable, and F being a rational function calculated...
US20100005299 METHOD FOR MANUFACTURING A PRODUCT, SYSTEM FOR MANUFACTURING A PRODUCT, AND PRODUCT  
Provided is a product on which is imprinted an encrypted message obtained by encrypting a message sent along with the product from a sender to a recipient, a method for manufacturing the product,...
US20110200188 Method of performing cipher block chaining using elliptic polynomial cryptography  
The method of performing cipher block chaining using elliptic polynomial cryptography allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the...
US20150023496 PAIRING COMPUTATION APPARATUS, PAIRING COMPUTATION METHOD, AND COMPUTER PROGRAM PRODUCT  
According to an embodiment, a pairing computation apparatus receives two points on a predetermined elliptic curve defined on a finite field, and outputs a pairing value that is an element on an...
US20130070922 TECHNIQUE FOR SECURELY COMMUNICATING AND STORING PROGRAMMING MATERIAL IN A TRUSTED DOMAIN  
A “trusted domain” is established within which content received from a communications network, e.g., a cable TV network, is protected from unauthorized copying thereof, in accordance with the...
US20150249535 RESISTANCE TO CACHE TIMING ATTACKS ON BLOCK CIPHER ENCRYPTION  
Technology is generally described for improving resistance to cache timing attacks made on block cipher encryption implementations. In some examples, the technology can include identifying one or...
US20110004607 TECHNIQUES FOR REPRESENTING KEYWORDS IN AN ENCRYPTED SEARCH INDEX TO PREVENT HISTOGRAM-BASED ATTACKS  
A method and system for cryptographically indexing, searching for, and retrieving documents is provided. In some embodiments, an encryption system is provided that generates a document index that...
US20110051927 DEVICE FOR GENERATING A MESSAGE AUTHENTICATION CODE FOR AUTHENTICATING A MESSAGE  
Device for generating a message authentication code for authenticating a message, wherein the message is divided in blocks (M) with a specified block length, the device comprising a generating...
US20110274269 ENCODING POINTS OF AN ELLIPTIC CURVE  
The method comprises, in an electronic component, carrying out a cryptographic calculation that includes the step of obtaining points P on an elliptic curve following the equation...