AcclaimIP-ad

Match Document Document Title
US20100303230 Secure Identity Binding (SIB)  
A system includes a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and a device to be identified by the tag, in which: the device is configured to...
US20090080645 INTEGRATED SHUFFLE VALIDITY PROVING DEVICE, PROOF INTEGRATING DEVICE, INTEGRATED SHUFFLE VALIDITY VERIFYING DEVICE, AND MIX NET SYSTEM  
An integrated shuffle validity proving device (300) is provided correspondingly to an ordinal number κ which is an integer representing an order. The device (300) has a permutation proof...
US20130287205 PARALLEIZEABLE INTEGRITY-AWARE ENCRYPTION TECHNIQUE  
A parallelizable integrity-aware encryption technique is provided. In at least one embodiment of the present disclosure, a parallelizable integrity-aware encryption method comprises whitening at...
US20100228675 Issuing machine and issuing system  
An issuing system for issuing unmodifiable and/or unforgeable hardcopy documents or securities includes a server and a plurality of issuing machines connected to the server via a network. Each of...
US20110200185 Method of performing elliptic polynomial cryptography with elliptic polynomial hopping  
The method of performing elliptic polynomial cryptography with elliptic polynomial hopping allows for the encryption of messages through elliptic polynomial cryptography, i.e., using elliptic...
US20110274268 CRYPTOGRAPHIC ALGORITHM FAULT PROTECTIONS  
The invention relates to a method for securing the execution of a cryptographic algorithm A against fault attacks. Given a cryptographic key K0 and a message M, the cryptographic algorithm A is...
US20080063185 Symmetric cryptosystem using cascaded chaotic maps  
A symmetric cryptosystem uses cascaded chaotic maps to encrypt plaintext and decrypt ciphertext. Received plaintext is encrypted using the cascaded chaotic maps to generate a ciphertext. The...
US20120076293 HYBRID MODE CRYPTOGRAPHIC METHOD AND SYSTEM WITH MESSAGE AUTHENTICATION  
An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method...
US20130156180 Method And Device For Securing Block Ciphers Against Template Attacks  
A method for securing a block cipher F, encrypted with a working key K0, against template attacks is provided. A working permutation F(K0) fixed by the block cipher F and the working key K0, and a...
US20120170740 CONTENT PROTECTION APPARATUS AND CONTENT ENCRYPTION AND DECRYPTION APPARATUS USING WHITE-BOX ENCRYPTION TABLE  
A content protection apparatus using a white-box encryption table includes: a random number generation unit for generating a random number; a white-box encryption table for encrypting the random...
US20130322617 PHYSICALLY UNCLONABLE FUNCTIONS BASED ON NON-LINEARITY OF SUB-THRESHOLD OPERATION  
An electronic circuit for implementing a physically unclonable function. The electronic circuit includes duplicate circuits, referred to as “circuit primitives,” that generate a first and a second...
US20090041229 Elliptic Curve Point Transformations  
In an elliptic curve cryptographic system, point coordinates in a first coordinate system are transformed into a second coordinate system. The transformed coordinates are processed by field...
US20120170739 METHOD OF DIVERSIFICATION OF A ROUND FUNCTION OF AN ENCRYPTION ALGORITHM  
A method of diversification of an iterative function of an encryption algorithm. During an iteration at least one parameter other than an encryption key and an input message is modified. It is...
US20140286487 METHOD FOR GENERATING A ONE-WAY FUNCTION  
A method for generating a one-way function, as well as a circuit arrangement, which implements the one-way function, are set forth.
US20120121079 CIPHER INDEPENDENT INTERFACE FOR CRYPTOGRAPHIC HARDWARE SERVICE  
Disclosed is a cipher independent cryptographic hardware service. Cipher independent transactions are received into input slots (202). The input slots contain FIFOs to hold the transactions. The...
US20110016305 SYSTEM AND METHOD FOR TRANSFORMING INFORMATION  
A method for transforming information, comprising the steps of encoding two or more original messages into a single encoded information and decoding the single encoded information using multiple...
US20150222434 CRT-RSA ENCRYPTION METHOD AND APPARATUS  
CRT-RSA encryption methods and apparatuses are disclosed. The CRT-RSA encryption method includes: calculating first parameter information and second parameter information used in a modular...
US20110164745 Secure Compressive Sampling Using Codebook of Sampling Matrices  
In one aspect, a compressive sampling encoder comprises matrix determination circuitry configured to determine a particular sampling matrix selected from a codebook comprising a plurality of...
US20120069994 METHOD FOR GENERTAING A DIGITAL SIGNATURE  
A method for generating a digital signature includes calculating a first magnitude representative of the inverse of a random number raised to the power two; obtaining a first element of the...
US20120057695 CIRCUITS FOR MODULAR ARITHMETIC BASED ON THE COMPLEMENTATION OF CONTINUED FRACTIONS  
A method for calculating a modular multiplication of integers a and b or polynomials a(x) and b(x) for a modulus N. The method including (i) calculating a supplemental product continued fraction...
US20140153714 Challenge-Response Authentication Using a Masked Response Value  
Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are...
US20110173454 ASSOCIATING POLICY WITH UNENCRYPTED DIGITAL CONTENT  
A content license associated with unencrypted digital content is generated, the content license including both an identifier of the unencrypted digital content and a content policy. At a user...
US20120250855 MIX-NET SYSTEM  
Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a...
US20130136256 BLOCK ENCRYPTION  
Methods and systems for encrypting and decrypting data are described. In one embodiment, a computing system determines a first initialization vector (IV) from another IV and a sequence number of a...
US20120321074 METHOD FOR CONVERSION OF A FIRST ENCRYPTION INTO A SECOND ENCRYPTION  
A method for converting, by means of a conversion entity, a first digit into a second digit, the first cipher corresponding to the result of a symmetric probabilistic encryption of an plain...
US20050102498 Data storage and/or retrieval  
Embodiments of methods, devices and/or systems for data storage and/or retrieval are described.
US20120106731 SPEEDING UP GALOIS COUNTER MODE (GCM) COMPUTATIONS  
Methods and apparatus to speed up Galois Counter Mode (GCM) computations are described. In one embodiment, a carry-less multiplication instruction may be used to perform operations corresponding...
US20150055776 Method and System for High Throughput Blockwise Independent Encryption/Decryption  
An encryption technique is disclosed for encrypting a plurality of data blocks of a data segment where the encryption selectively switches between a blockwise independent randomized (BIR)...
US20130148802 Method and System for High Throughput Blockwise Independent Encryption/Decryption  
An encryption technique is disclosed for encrypting a plurality of data blocks of a data segment where the encryption selectively switches between a blockwise independent randomized (BIR)...
US20120314855 Trapdoor One-Way Functions on Elliptic Curves and Their Application to Shorter Signatures and Asymmetric Encryption  
A new trapdoor one-way function is provided. In a general sense, some quadratic algebraic integer z is used. One then finds a curve E and a rational map defining [z] on E. The rational map [z] is...
US20130077778 Duo Codes for Product Authentication  
Systems and methods are provided that employ two or more cryptographically linked codes. The codes, when encrypted, become cipher texts that appear unrelated. The codes described herein are...
US20070098151 Cryptographic protocol security verification apparatus, cryptographic protocol design apparatus, cryptographic protocol security verification method, cryptographic protocol design method and computer program product  
A cryptographic protocol security verification apparatus includes a formal verification unit verifying a presence or absence of a defect of a process for a party and a first virtual entity based...
US20110116625 CRYPTOGRAPHIC SYSTEM  
A cryptographic system comprises a white-box implementation of a function; an implementation of a cryptographic algorithm; and an implementation of a combining operation for establishing...
US20130028412 METHOD OF COUNTER-MEASURING AGAINST SIDE-CHANNEL ATTACKS  
According to the present invention there is provided a method of counter-measuring against side channel attacks, the method comprising executing a block-cipher algorithm to mask intermediate...
US20090279694 PRIVACY-PRESERVING SCALAR PRODUCT CALCULATION SYSTEM, PRIVACY-PRESERVING SCALAR PRODUCT CALCULATION METHOD AND CRYPTOGRAPHIC KEY SHARING SYSTEM  
A privacy-preserving scalar product calculation system is provided. A first unit linearly transforms an n-dimensional vector Va into an n-dimensional vector based on a scalar value based on a...
US20110090541 FINGERPRINT SCANNING SYSTEMS AND METHODS  
Embodiments relate to methods and systems for gathering, archiving, transmitting, and processing forensic and latent fingerprints. An integrated forensic fingerprint scanning system is provided...
US20100310067 Method and System for Providing Synchronous Running Encoding and Encryption  
Aspects of the invention provide a method and system for coding information in a communication channel. More particularly, aspects of the invention provide an method and system for synchronous...
US20120163586 ORDER-PRESERVING ENCRYPTION AND DECRYPTION APPARATUS AND METHOD THEREOF  
An order-preserving encryption apparatus includes an initializer for setting a total space of a ciphertext with respect to a total space of a plaintext by considering security of the ciphertext,...
US20110161661 ENHANCED AUTHORIZATION PROCESS USING DIGITAL SIGNATURES  
A method is provided for enhancing security of a communication session between first and second endpoints which employs a key management protocol. The method includes sending a first message to a...
US20150180667 SECONDARY ELEMENTS IN A FUZZY VAULT ENCODING SCHEME  
The description relates in particular to a method for encoding information represented in the form of a function P, and to a corresponding method for decoding information. The encoding comprises...
US20080205654 Method and Security System for the Secure and Unequivocal Encoding of a Security Module  
The present invention relates to a method and a security system for the secure and unequivocal encoding of a security module, in particular a chip card. To this end, a security module (10) is...
US20120170738 Methods and Apparatus in Alternate Finite Field Based Coders and Decoders  
Methods and apparatus for coding and decoding n-state symbols with n≧2 and n>2 and n>3 and n>4 are provided wherein at least one implementation of an addition over an alternate finite field GF(n)...
US20110064214 Methods and Apparatus in Alternate Finite Field Based Coders and Decoders  
Methods and apparatus for coding and decoding n-state symbols with n≧2 and n>2 and n>3 and n>4 are provided wherein at least one implementation of an addition over an alternate finite field GF(n)...
US20120155638 SECURING KEYS OF A CIPHER USING PROPERTIES OF THE CIPHER PROCESS  
In the field of computer enabled cryptography, such as a block cipher, the cipher is hardened against an attack by protecting the cipher key, by applying to it a predetermined linear permutation...
US20110107100 METHOD AND SYSTEM FOR PROVIDING SECURE CODES FOR MARKING ON ITEMS  
A method and system for creating a group of marking codes for marking items in a code generation and validation system and validating the marking codes. The code generation and validation system...
US20060104438 Method for making secure an electronic entity with encrypted access  
A method for protecting an electronic entity with encrypted access, against DFA (Differential Fault Analysis) attacks which includes: storing the result of a selected step (Rm, Kn) of an iterative...
US20120288086 FINITE FIELD CRYPTOGRAPHIC ARITHMETIC RESISTANT TO FAULT ATTACKS  
Various embodiments relate to a method for integrity protected calculation of a cryptographic function including: performing an operation c=a∘b in a cryptographic function f(x1, x2, . . . , xn)...
US20100223478 SYSTEM AND METHOD FOR PERFORMING EXPONENTIATION IN A CRYPTOGRAPHIC SYSTEM  
There are disclosed systems and methods for computing an exponentiatied message. In one embodiment blinding is maintained during the application of a Chinese Remainder Theorem (CRT) algorithm and...
US20120134493 CRYPTOGRAPHY BY PARAMETERIZING ON ELLIPTIC CURVE  
A device is controlled by a controller on the basis of a password. A determination is made at the device or at the controller, on the basis of a random value r1, of a point P(X,Y) on an elliptic...
US20140334622 AUTHENTICATION DEVICE, OUTPUT DEVICE, VERIFICATION DEVICE AND INPUT DEVICE  
According to an authentication device is for authenticating the validity of a subject ciphertext generated by encrypting a plaintext using homomorphic encryption. The authentication device...