Match

Document 
Document Title 

US20100303230 
Secure Identity Binding (SIB)
A system includes a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and a device to be identified by the tag, in which: the device is configured to... 

US20090080645 
INTEGRATED SHUFFLE VALIDITY PROVING DEVICE, PROOF INTEGRATING DEVICE, INTEGRATED SHUFFLE VALIDITY VERIFYING DEVICE, AND MIX NET SYSTEM
An integrated shuffle validity proving device (300) is provided correspondingly to an ordinal number κ which is an integer representing an order. The device (300) has a permutation proof... 

US20130287205 
PARALLEIZEABLE INTEGRITYAWARE ENCRYPTION TECHNIQUE
A parallelizable integrityaware encryption technique is provided. In at least one embodiment of the present disclosure, a parallelizable integrityaware encryption method comprises whitening at... 

US20100228675 
Issuing machine and issuing system
An issuing system for issuing unmodifiable and/or unforgeable hardcopy documents or securities includes a server and a plurality of issuing machines connected to the server via a network. Each of... 

US20110200185 
Method of performing elliptic polynomial cryptography with elliptic polynomial hopping
The method of performing elliptic polynomial cryptography with elliptic polynomial hopping allows for the encryption of messages through elliptic polynomial cryptography, i.e., using elliptic... 

US20110274268 
CRYPTOGRAPHIC ALGORITHM FAULT PROTECTIONS
The invention relates to a method for securing the execution of a cryptographic algorithm A against fault attacks. Given a cryptographic key K0 and a message M, the cryptographic algorithm A is... 

US20080063185 
Symmetric cryptosystem using cascaded chaotic maps
A symmetric cryptosystem uses cascaded chaotic maps to encrypt plaintext and decrypt ciphertext. Received plaintext is encrypted using the cascaded chaotic maps to generate a ciphertext. The... 

US20120076293 
HYBRID MODE CRYPTOGRAPHIC METHOD AND SYSTEM WITH MESSAGE AUTHENTICATION
An encryption and authentication technique that achieves enhanced integrity verification through assured errorpropagation using a multistage sequence of pseudorandom permutations. The method... 

US20130156180 
Method And Device For Securing Block Ciphers Against Template Attacks
A method for securing a block cipher F, encrypted with a working key K0, against template attacks is provided. A working permutation F(K0) fixed by the block cipher F and the working key K0, and a... 

US20120170740 
CONTENT PROTECTION APPARATUS AND CONTENT ENCRYPTION AND DECRYPTION APPARATUS USING WHITEBOX ENCRYPTION TABLE
A content protection apparatus using a whitebox encryption table includes: a random number generation unit for generating a random number; a whitebox encryption table for encrypting the random... 

US20130322617 
PHYSICALLY UNCLONABLE FUNCTIONS BASED ON NONLINEARITY OF SUBTHRESHOLD OPERATION
An electronic circuit for implementing a physically unclonable function. The electronic circuit includes duplicate circuits, referred to as “circuit primitives,” that generate a first and a second... 

US20090041229 
Elliptic Curve Point Transformations
In an elliptic curve cryptographic system, point coordinates in a first coordinate system are transformed into a second coordinate system. The transformed coordinates are processed by field... 

US20120170739 
METHOD OF DIVERSIFICATION OF A ROUND FUNCTION OF AN ENCRYPTION ALGORITHM
A method of diversification of an iterative function of an encryption algorithm. During an iteration at least one parameter other than an encryption key and an input message is modified. It is... 

US20140286487 
METHOD FOR GENERATING A ONEWAY FUNCTION
A method for generating a oneway function, as well as a circuit arrangement, which implements the oneway function, are set forth. 

US20120121079 
CIPHER INDEPENDENT INTERFACE FOR CRYPTOGRAPHIC HARDWARE SERVICE
Disclosed is a cipher independent cryptographic hardware service. Cipher independent transactions are received into input slots (202). The input slots contain FIFOs to hold the transactions. The... 

US20110016305 
SYSTEM AND METHOD FOR TRANSFORMING INFORMATION
A method for transforming information, comprising the steps of encoding two or more original messages into a single encoded information and decoding the single encoded information using multiple... 

US20150222434 
CRTRSA ENCRYPTION METHOD AND APPARATUS
CRTRSA encryption methods and apparatuses are disclosed. The CRTRSA encryption method includes: calculating first parameter information and second parameter information used in a modular... 

US20110164745 
Secure Compressive Sampling Using Codebook of Sampling Matrices
In one aspect, a compressive sampling encoder comprises matrix determination circuitry configured to determine a particular sampling matrix selected from a codebook comprising a plurality of... 

US20120069994 
METHOD FOR GENERTAING A DIGITAL SIGNATURE
A method for generating a digital signature includes calculating a first magnitude representative of the inverse of a random number raised to the power two; obtaining a first element of the... 

US20120057695 
CIRCUITS FOR MODULAR ARITHMETIC BASED ON THE COMPLEMENTATION OF CONTINUED FRACTIONS
A method for calculating a modular multiplication of integers a and b or polynomials a(x) and b(x) for a modulus N. The method including (i) calculating a supplemental product continued fraction... 

US20140153714 
ChallengeResponse Authentication Using a Masked Response Value
Challengeresponse authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are... 

US20110173454 
ASSOCIATING POLICY WITH UNENCRYPTED DIGITAL CONTENT
A content license associated with unencrypted digital content is generated, the content license including both an identifier of the unencrypted digital content and a content policy. At a user... 

US20120250855 
MIXNET SYSTEM
Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a... 

US20130136256 
BLOCK ENCRYPTION
Methods and systems for encrypting and decrypting data are described. In one embodiment, a computing system determines a first initialization vector (IV) from another IV and a sequence number of a... 

US20120321074 
METHOD FOR CONVERSION OF A FIRST ENCRYPTION INTO A SECOND ENCRYPTION
A method for converting, by means of a conversion entity, a first digit into a second digit, the first cipher corresponding to the result of a symmetric probabilistic encryption of an plain... 

US20050102498 
Data storage and/or retrieval
Embodiments of methods, devices and/or systems for data storage and/or retrieval are described. 

US20120106731 
SPEEDING UP GALOIS COUNTER MODE (GCM) COMPUTATIONS
Methods and apparatus to speed up Galois Counter Mode (GCM) computations are described. In one embodiment, a carryless multiplication instruction may be used to perform operations corresponding... 

US20150055776 
Method and System for High Throughput Blockwise Independent Encryption/Decryption
An encryption technique is disclosed for encrypting a plurality of data blocks of a data segment where the encryption selectively switches between a blockwise independent randomized (BIR)... 

US20130148802 
Method and System for High Throughput Blockwise Independent Encryption/Decryption
An encryption technique is disclosed for encrypting a plurality of data blocks of a data segment where the encryption selectively switches between a blockwise independent randomized (BIR)... 

US20120314855 
Trapdoor OneWay Functions on Elliptic Curves and Their Application to Shorter Signatures and Asymmetric Encryption
A new trapdoor oneway function is provided. In a general sense, some quadratic algebraic integer z is used. One then finds a curve E and a rational map defining [z] on E. The rational map [z] is... 

US20130077778 
Duo Codes for Product Authentication
Systems and methods are provided that employ two or more cryptographically linked codes. The codes, when encrypted, become cipher texts that appear unrelated. The codes described herein are... 

US20070098151 
Cryptographic protocol security verification apparatus, cryptographic protocol design apparatus, cryptographic protocol security verification method, cryptographic protocol design method and computer program product
A cryptographic protocol security verification apparatus includes a formal verification unit verifying a presence or absence of a defect of a process for a party and a first virtual entity based... 

US20110116625 
CRYPTOGRAPHIC SYSTEM
A cryptographic system comprises a whitebox implementation of a function; an implementation of a cryptographic algorithm; and an implementation of a combining operation for establishing... 

US20130028412 
METHOD OF COUNTERMEASURING AGAINST SIDECHANNEL ATTACKS
According to the present invention there is provided a method of countermeasuring against side channel attacks, the method comprising executing a blockcipher algorithm to mask intermediate... 

US20090279694 
PRIVACYPRESERVING SCALAR PRODUCT CALCULATION SYSTEM, PRIVACYPRESERVING SCALAR PRODUCT CALCULATION METHOD AND CRYPTOGRAPHIC KEY SHARING SYSTEM
A privacypreserving scalar product calculation system is provided. A first unit linearly transforms an ndimensional vector Va into an ndimensional vector based on a scalar value based on a... 

US20110090541 
FINGERPRINT SCANNING SYSTEMS AND METHODS
Embodiments relate to methods and systems for gathering, archiving, transmitting, and processing forensic and latent fingerprints. An integrated forensic fingerprint scanning system is provided... 

US20100310067 
Method and System for Providing Synchronous Running Encoding and Encryption
Aspects of the invention provide a method and system for coding information in a communication channel. More particularly, aspects of the invention provide an method and system for synchronous... 

US20120163586 
ORDERPRESERVING ENCRYPTION AND DECRYPTION APPARATUS AND METHOD THEREOF
An orderpreserving encryption apparatus includes an initializer for setting a total space of a ciphertext with respect to a total space of a plaintext by considering security of the ciphertext,... 

US20110161661 
ENHANCED AUTHORIZATION PROCESS USING DIGITAL SIGNATURES
A method is provided for enhancing security of a communication session between first and second endpoints which employs a key management protocol. The method includes sending a first message to a... 

US20150180667 
SECONDARY ELEMENTS IN A FUZZY VAULT ENCODING SCHEME
The description relates in particular to a method for encoding information represented in the form of a function P, and to a corresponding method for decoding information. The encoding comprises... 

US20080205654 
Method and Security System for the Secure and Unequivocal Encoding of a Security Module
The present invention relates to a method and a security system for the secure and unequivocal encoding of a security module, in particular a chip card. To this end, a security module (10) is... 

US20120170738 
Methods and Apparatus in Alternate Finite Field Based Coders and Decoders
Methods and apparatus for coding and decoding nstate symbols with n≧2 and n>2 and n>3 and n>4 are provided wherein at least one implementation of an addition over an alternate finite field GF(n)... 

US20110064214 
Methods and Apparatus in Alternate Finite Field Based Coders and Decoders
Methods and apparatus for coding and decoding nstate symbols with n≧2 and n>2 and n>3 and n>4 are provided wherein at least one implementation of an addition over an alternate finite field GF(n)... 

US20120155638 
SECURING KEYS OF A CIPHER USING PROPERTIES OF THE CIPHER PROCESS
In the field of computer enabled cryptography, such as a block cipher, the cipher is hardened against an attack by protecting the cipher key, by applying to it a predetermined linear permutation... 

US20110107100 
METHOD AND SYSTEM FOR PROVIDING SECURE CODES FOR MARKING ON ITEMS
A method and system for creating a group of marking codes for marking items in a code generation and validation system and validating the marking codes. The code generation and validation system... 

US20060104438 
Method for making secure an electronic entity with encrypted access
A method for protecting an electronic entity with encrypted access, against DFA (Differential Fault Analysis) attacks which includes: storing the result of a selected step (Rm, Kn) of an iterative... 

US20120288086 
FINITE FIELD CRYPTOGRAPHIC ARITHMETIC RESISTANT TO FAULT ATTACKS
Various embodiments relate to a method for integrity protected calculation of a cryptographic function including: performing an operation c=a∘b in a cryptographic function f(x1, x2, . . . , xn)... 

US20100223478 
SYSTEM AND METHOD FOR PERFORMING EXPONENTIATION IN A CRYPTOGRAPHIC SYSTEM
There are disclosed systems and methods for computing an exponentiatied message. In one embodiment blinding is maintained during the application of a Chinese Remainder Theorem (CRT) algorithm and... 

US20120134493 
CRYPTOGRAPHY BY PARAMETERIZING ON ELLIPTIC CURVE
A device is controlled by a controller on the basis of a password. A determination is made at the device or at the controller, on the basis of a random value r1, of a point P(X,Y) on an elliptic... 

US20140334622 
AUTHENTICATION DEVICE, OUTPUT DEVICE, VERIFICATION DEVICE AND INPUT DEVICE
According to an authentication device is for authenticating the validity of a subject ciphertext generated by encrypting a plaintext using homomorphic encryption. The authentication device... 