Match Document Document Title
US20080192932 Method of Securely Reading Data From a Transponder  
The invention discloses a method of reading data (dat) from a first transponder (TAG1) into a transceiver (REA). Said (dat) are only transmitted from the first transponder (TAG1) to the...
US20060045262 Reliable elliptic curve cryptography computation  
A method for reliable computation of point additions and point multiplications in an elliptic curve cryptography (ECC) system. Two asymmetric operations are performed: one of the operations is of...
US20140321638 APPARATUS AND METHOD TO PREVENT SIDE CHANNEL POWER ATTACKS IN ADVANCED ENCRYPTION STANDARD  
Apparatus and method for obscuring round 1 power consumption of hardware implementation of the Advanced Encryption Standard (AES) algorithm. Additional hardware circuitry will provide consistent...
US20120099725 METHOD OF GENERATING ID WITH GUARANTEED VALIDITY, AND VALIDITY LEGITIMACY GUARANTYING RFID TAG  
A portion of a digital signature value for authenticating the validity of ID information is also used as an ID so as to reduce the amount of data. This is achieved by using a digital signature...
US20120275593 APPARATUS FOR PERFORMING A FAULT DETECTION OPERATION AND METHOD THEREOF  
An apparatus for performing a fault detection operation may include a first-coordinate computing unit receiving a first point and a second point in a binary finite field, the first and second...
US20110293088 METHOD OF DETERMINING A REPRESENTATION OF A PRODUCT, METHOD OF EVALUATING A FUNCTION AND ASSOCIATED DEVICES  
A representation is determined of the product of first and second elements of a finite set with cardinality strictly greater than two and in which are defined an addition and a multiplication that...
US20110261955 SCALAR MULTIPLIER AND SCALAR MULTIPLICATION PROGRAM  
Provided are a scalar multiplier and a scalar multiplication program for performing a scalar multiplication at a high speed. In computing a scalar multiplication [s]P of a rational point P of an...
US20130016830 POWER ANALYSIS ATTACK COUNTERMEASURE FOR THE ECDSA  
Execution of the Elliptic Curve Digital Signature Algorithm (ECDSA) requires determination of a signature, which determination involves arithmetic operations. Some of the arithmetic operations...
US20120027199 SYSTEM AND METHOD FOR ENABLING ACCESS TO A PROTECTED HARDWARE RESOURCE  
Systems and methods are disclosed for enabling access to a protected hardware resource. A hardware component includes at least one protected hardware resource. A unique hardware ID and a unique...
US20150229482 QUANTUM SECURE DEVICE, SYSTEM AND METHOD FOR VERIFYING CHALLENGE-RESPONSE PAIRS USING A PHYSICALLY UNCLONABLE FUNCTION (PUF)  
A device for verifying at least one challenge-response pair includes a coherent light source configured to emit coherent light. A challenge creating device is configured to create an optical...
US20100054480 SHARING A SECRET USING POLYNOMIALS OVER POLYNOMIALS  
A method and system distributes N shares of a secret among cooperating entities by representing the secret as a secret polynomial, and forming a splitting polynomial with the secret polynomial as...
US20090290704 METHOD FOR PROTECTING A CAP FILE FOR AN IC CARD  
A method for protecting a CAP file including one or more applets to be installed in an IC Card, includes the applets encoding into the CAP file by a CAP file provider. The method also includes the...
US20140105383 METHOD AND DEVICE FOR NEGOTIATING MACHINE TYPE COMMUNICATION DEVICE GROUP ALGORITHM  
Disclosed is a method for negotiating machine type communication (MTC) device group algorithms, including: selecting a negotiated group encryption algorithm and a negotiated group integrity...
US20080025515 Systems and Methods for Digitally-Signed Updates  
Certain embodiments of the present invention provide a cryptographic system that enables updates with digital signatures, the signatures being created using an improved digital signature scheme,...
US20080095361 Security-Enhanced Key Exchange  
A unique identifier of a remote device is not sent in clear text on a local interlace between the remote device and a device that can communicate with a wireless network, but a procedure for...
US20100054457 SHARING A SECRET USING HYPERPLANES OVER GF(q)  
A method and system distributes N shares of a secret among cooperating entities using hyperplanes over GF(q), such that the secret can be reconstructed from K of the N shares (where K≦N). In one...
US20150172044 ORDER-PRESERVING ENCRYPTION SYSTEM, ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAMS THEREOF  
An encryption device comprises: a storage module for pre-storing an encryption key which is necessary for encryption processing; a pre-processing function unit which applies a pre-processing...
US20130339252 FORMAT-PRESERVING CRYPTOGRAPHIC SYSTEMS  
Format-preserving encryption and decryption processes are provided. The encryption and decryption processes may use a block cipher. A string that is to be encrypted or decrypted may be converted...
US20150172052 INTEGRITY VERIFICATION OF CRYPTOGRAPHIC KEY PAIRS  
Method of integrity verification of public and private cryptographic key pairs in the additive group of integers modulo n, with n being the product of two prime numbers p and q, the method...
US20140146964 AUTHENTICATED ENCRYPTION METHOD USING WORKING BLOCKS  
A computer-implemented authenticated encryption method for converting a plaintext message into a ciphertext message. The method includes dividing the plaintext message into at least two working...
US20080010467 Privacy-preserving concatenation of strings  
A system for contributing to a concatenation of a first string and a second string may include a communication unit to receive an encrypted representation of a second share of the second string,...
US20110268267 METHOD AND APPARATUS FOR PROVIDING CONTENT SERVICE  
There is provided a method and apparatus for providing a content service. A method of providing a content service includes generating a plurality of pieces of decryption information according to a...
US20140286486 BLOCK ENCRYPTION METHOD AND APPARATUS  
In accordance with an embodiment, the logical exclusive operation on the random number RAND and the OPc value are performed several times, the logical operation and encryption processing using a...
US20130016826 PROTECTION OF A MODULAR EXPONENTIATION CALCULATION BY ADDITION OF A RANDOM QUANTITY  
A method for protecting a calculation, by an electronic circuit, of a modular exponentiation of a digital quantity, wherein: a first variable is initialized with a random quantity increased by...
US20100002872 DATA TRANSFORMATION APPARATUS, DATA TRANSFORMATION METHOD, AND COMPUTER PROGRAM  
A non-linear transformation processing structure having a high implementation efficiency and a high security is realized. Data transformation is performed using a first non-linear transformation...
US20120314854 System, Apparatus and Method for Decentralizing Attribute-Based Encryption Information  
A method for secure transmission of a message encrypted under an attribute based encryption scheme is provided. A first and a second authority parameter may be received from one or more...
US20090175442 Digital Rights Management System Protecting Consumer Privacy  
Technologies for a Consumer Privacy Digital Rights Management system based on stable partially blind signatures that enable a license server to provide licenses for delivery to users without...
US20050135605 CRYPTOGRAPHIC EXPONENTIATION METHODS  
A method of modular exponentiation for use in cryptographic systems based on a GF(2n) or GF(p) arithmetic includes a representation of the exponent as a sum of products of Fermat numbers and...
US20130129081 LOW-COMPLEXITY ELECTRONIC CIRCUIT PROTECTED BY CUSTOMIZED MASKING  
A cryptography circuit protected by masking, said circuit including means for encrypting binary words using at least one key krc, means for applying linear processing operations and nonlinear...
US20110213972 METHOD OF EXECUTING A CRYPTOGRAPHIC CALCULATION  
A cryptographic calculation is executed in an electronic component, according to a cryptographic algorithm including at least one application of a one-way function which is disabled upon an...
US20150172917 RESTRICTING SOFTWARE TO AUTHORIZED WIRELESS ENVIRONMENTS  
An apparatus for restricting execution of software is disclosed. The apparatus includes a telecommunication device configured to communicate with a wireless device (e.g., an RFID device) using a...
US20060222175 Computation method, computing device and computer program  
The computing device calculates an equivalence H0≡2m*k+1 (mod n) relating to a divisor n of 2m*k+1 (step A), computes an equivalence H≡2E(p, m, k) (mod n) of 2E(p, m, k) (mod n) from H0 by an REDC...
US20070014396 Encoding/decoding circuit  
An encoding/decoding operation portion includes an encoding/decoding operation circuit and an avoiding path for detouring the encoding/decoding operation circuit and can select between encoding or...
US20070086586 Semi-public white-box cipher  
A computer-implemented system and method for configuring and operating a white-box cipher is disclosed. In one implementation, the system employs a method for configuring pseudorandom data derived...
US20090304185 METHOD OF TRACING DEVICE KEYS FOR BROADCAST ENCRYPTION  
Provided are a method of tracing a device key in a user key management system using a hierarchical hash chain broadcast encryption scheme (HBES) algorithm, a user key management system for...
US20150195085 ENCRYPTION DEVICE AND METHOD FOR DEFENDING A PHYSICAL ATTACK  
Provided are a security device and a method for operating same. The security device may conceal an encryption key used for an encryption algorithm in an encryption module in correspondence to...
US20090144542 SYSTEM FOR DISTRIBUTING DIGITAL MEDIA TO EXHIBITORS  
A system for packaging digital media and distributing digital media to exhibitors is described, which system enables distribution by utilizing media content booking, media content packaging,...
US20110116623 GENERATING GENUS 2 CURVES FROM INVARIANTS  
One or more techniques and/or systems are disclosed for generating a genus 2 curve for use in cryptography. One or more invariant values used to generate the genus 2 curve are determined by...
US20050036606 Weil and Tate pairing techniques using parabolas  
Methods and apparati are provided for use in cryptographically processing information based on elliptic and other like curves. The methods and apparati allow pairings, such as, for example, Weil...
US20100046739 SHARING A SECRET USING POLYNOMIAL DIVISION OVER GF(Q)  
A method and system for distributing a secret are described. In one embodiment, the secret is represented by a secret polynomial of degree d over GF(q) constructed with a prime or a power of a...
US20090177586 AUTHENTICATION DEVICE AND PAYMENT SYSTEM  
The payment system according to the present invention comprises an electronic payment device (2) and an authentication device (1) connected (3) together; the payment device (1) comprises a bank...
US20150100493 EyeWatch credit card fraud prevention system  
A method of iris scanning and proximity sensing, which includes receiving and photographing an iris in the iris scanning mode of the subject computer, laptop, mobile device or tablet, smartphone...
US20130010963 MULTIPLICATIVE SPLITS TO PROTECT CIPHER KEYS  
In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against an attack by a protection process which obscures the round...
US20090028325 CIRCUIT ARRANGEMENT FOR AND METHOD OF PERFORMING AN INVERSION OPERATION IN A CRYPTOGRAPHIC CALCULATION  
In order to further develop a circuit arrangement for as well as a method of performing an inversion operation in a cryptographic calculation, wherein only inversion modulo an odd number is...
US20150178503 OPTIMIZED HARDWARE ARCHITECTURE AND METHOD FOR ECC POINT DOUBLING USING JACOBIAN COORDINATES OVER SHORT WEIERSTRASS CURVES  
An optimized hardware architecture and method introducing a simple arithmetic processor that allows efficient implementation of an Elliptical Curve Cryptography point doubling algorithm for...
US20090003588 Counter Sealing Archives of Electronic Seals  
The description generally provides for systems and methods for a mobile communication network. Archives of seals can be sealed to protect the integrity of the seals and facilitate validation in...
US20060078125 Devices and methods for implementing cryptographic scrambling  
A cryptographic system splits a digital message into multiple parts, and scrambles sequencing of the multiple parts according to an algorithm requiring first and second keys to resolve. The keys...
US20090067617 SECURE MODULAR EXPONENTIATION BY RANDOMIZATION OF EXPONENT SCANNING  
Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates securing data associated with messages in accordance with a...
US20100040225 Fast Scalar Multiplication for Elliptic Curve Cryptosystems over Prime Fields  
Fast scalar multiplication operations are disclosed for use in an elliptic curve cryptographic system The operations use binary representations of a secret key and points on an elliptic curve...
US20140233727 METHOD FOR SECURE SUBSTRING SEARCH  
A system and method for secure substring search, using fully homomorphic encryption, or somewhat homomorphic encryption. In one embodiment, a first string is homomorphically compared to trial...