Match Document Document Title
US20130315387 ENCRYPTION METHOD CHARACTERIZED BY THREE DIMENSIONAL COMPUTATION, FEEDBACK CONTROL, AND DYNAMIC TRANSITION BOX  
An encryption method adopts an encryption principle based on sequential logic and involves performing three dimensional computation on a plaintext data unit having undergone non-linear transition...
US20090074178 Accelerating Scalar Multiplication On Elliptic Curve Cryptosystems Over Prime Fields  
A method and apparatus for accelerating scalar multiplication in an elliptic curve cryptosystem (ECC) over prime fields is provided. Multiplication operations within an ECC point operation are...
US20150244524 Side-Channel-Protected Masking  
The invention provides a method, in a processor, for executing a cryptographic computation. Upon the execution of the computation there is applied a base masking through which intermediate values...
US20130208886 METHOD OF PREVENTING FAULT-INJECTION ATTACKS ON CHINESE REMAINDER THEOREM-RIVEST SHAMIR ADLEMAN CRYPTOGRAPHIC OPERATIONS AND RECORDING MEDIUM FOR STORING PROGRAM IMPLEMENTING THE SAME  
Disclosed herein are a method of preventing fault-injection attacks on Chinese Remainder Theorem (CRT)-Rivest Shamir Adleman (RSA) cryptographic operations, and a recording medium for storing a...
US20100014658 METHOD OF CUSTOMIZING A SECURITY COMPONENT, NOTABLY IN AN UNPROTECTED ENVIRONMENT  
The invention relates to a method of customizing a security component in an unprotected environment. The method according to embodiments of the invention includes: inserting a first secret K0 into...
US20080181396 DATA OBFUSCATION OF TEXT DATA USING ENTITY DETECTION AND REPLACEMENT  
A data obfuscation method, apparatus and computer program product are disclosed in which at least selected text entities such as words or abbreviations in a document are obfuscated to prevent the...
US20100046740 EMBEDDING A SECRET IN A LARGER POLYNOMIAL  
A secret polynomial is embedded in a larger polynomial. In one embodiment, the secret is represented as a secret polynomial of degree d over GF(q), q being a prime or a power of a prime. The...
US20080144834 Security System Communications Including Encryption  
A security system (20) includes a plurality of sensors (22-26) that provide an indication of a security condition to a corresponding plurality of microcontrollers (32-36). Each microcontroller...
US20110271105 METHOD AND APPARATUS FOR IMPLEMENTING A NOVEL ONE-WAY HASH FUNCTION ON HIGHLY CONSTRAINED DEVICES SUCH AS RFID TAGS  
A method and apparatus for implementing a novel one-way hash function with provable security properties for authentication and non-authentication applications on highly constrained devices, with...
US20130003964 Simultaneous Scalar Multiplication Method  
In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in...
US20110261956 Simultaneous Scalar Multiplication Method  
In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in...
US20110280394 Format-Preserving Encryption Via Rotating Block Encryption  
Methods and systems are described for format-preserving encryption. Format-preserving encryption on an entire format F may be achieved by performing format-preserving encryption on one or more...
US20110142229 APPARATUS AND METHOD FOR PERFORMING TRANSPARENT HASH FUNCTIONS  
A method for performing hash operations including: receiving a hash instruction that prescribes one of the hash operations and one of a plurality of hash algorithms; translating the hash...
US20080232597 ITERATIVE SYMMETRIC KEY CIPHERS WITH KEYED S-BOXES USING MODULAR EXPONENTIATION  
Disclosed is the design and development of a new cipher called the Dragonfire Cipher. The Dragon cipher includes message authentication code and keyed random number generator. Dragonfire cipher...
US20140341374 METHOD OF GENERATING SECURE TOKENS AND TRANSMISSION BASED ON (TRNG) GENERATED TOKENS AND SPLIT INTO SHARES AND THE SYSTEM THEREOF  
A method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares, the method comprising steps of generating the keys by a hardware based True Random...
US20130202106 Performing AES Encryption Or Decryption In Multiple Modes With A Single Instruction  
A machine-readable medium may have stored thereon an instruction, which when executed by a machine causes the machine to perform a method. The method may include combining a first operand of the...
US20090060176 PROGRAM CONVERTER, ENCRYPTING DEVICE, AND ENCRYPTING METHOD  
A program converter (1) converts a program (P) which performs arithmetic addition processing to execute encryption, into a converted program (tP) which performs processing equivalent to the...
US20120189120 SYSTEM AND METHOD FOR PROTECTING DATA OF MOBILE PHONE  
In a method for protecting data of a mobile phone, the mobile phone includes a storage system. The storage system stores a plaintext file to be encrypted and an international mobile equipment...
US20080205637 THRESHOLD SECRET SHARING APPARATUS, THRESHOLD SECRET SHARING SCHEME, SECRET INFORMATION DECRYPTION METHOD, AND PROGRAM FOR THE SAME  
A threshold secret sharing apparatus, a threshold secret sharing scheme, a secret information recovery apparatus a secret information recovery method, and a program thereof are provided using XOR...
US20120002807 WHITE-BOX CRYPTOGRAPHIC SYSTEM WITH INPUT DEPENDENT ENCODINGS  
A white-box cryptographic system is presented wherein at least one of its internal values is represented using an input dependent encoding. The system comprises a network of a plurality of basic...
US20120243679 VERIFICATION DEVICE, SECRET INFORMATION RESTORATION DEVICE, VERIFICATION METHOD, PROGRAM, AND SECRET SHARING SYSTEM  
A verification device, upon the input of any k items of shared information among n items of shared information and “t”: generates as subsets all combinations that select r items of shared...
US20090268900 SIGNED MONTGOMERY ARITHMETIC  
A system and method configured for applying Montgomery style reduction directly to negative quantities as well as positive values, producing the new form which does not require conditional...
US20060291647 Encrypted communications  
A communications system in which a sending computer encrypts a message using a key associated with the computer which is to receive the message; and the receiving computer uses a key associated...
US20090003607 ALTERING THE SIZE OF WINDOWS IN PUBLIC KEY CRYPTOGRAPHIC COMPUTATIONS  
In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase. Then an exponentiation phase is performed, wherein the exponentiation phase...
US20080056497 METHOD OF GENERATING ANTI-COLLUSION FINGERPRINT CODES USING  
Disclosed herein is a method of generating anti-collusion fingerprint codes using a (na, n2a−2, na−1, n, 0, 1) GD-PBIBD. The fingerprint codes are generated using computer equipment that executes...
US20130124849 System And Method For Individualizing Content For A Consumer  
Protected content that has been encrypted according to an encryption algorithm is individualized for a consumer according to pseudorandomly-generated individualization data values and...
US20100088521 PUBLIC ENCRYPTED DISCLOSURE  
Public encrypted disclosure provides a creation date verification system by making confidential information available in a secure encrypted form that can be decrypted at a later time to verify the...
US20130062420 METHOD AND SYSTEM FOR THE GENERATION AND VALIDATION OF PERSONAL IDENTIFICATION NUMBERS  
A method and apparatus for encoding and decoding sequential index numbers to pseudo-random Personal Identification Codes (PINs) of varying word size in disclosed. The word size is defined by a...
US20130016827 PROTECTION OF A CALCULATION ON AN ELLIPTIC CURVE  
A method for protecting a calculation on an elliptic curve, by an electronic circuit, wherein a point of an elliptic curve is multiplied by a digital quantity, comprising the steps of:...
US20110142228 APPARATUS AND METHOD FOR EMPLOYING CONFIGURABLE HASH ALGORITHMS  
A method for performing hash operations including: receiving a hash instruction that is part of an application program, where the hash instruction prescribes one of the hash operations and one of...
US20130114806 METHOD FOR ENCRYPTING A MESSAGE THROUGH THE COMPUTATION OF MATHEMATICAL FUNCTIONS COMPRISING MODULAR MULTIPLICATIONS  
An embodiment concerns a method for encrypting a message through a cryptographic algorithm including a computation of a mathematical function including the computation of one or more modular...
US20100017614 ENCODING AND DETECTING APPARATUS  
An encoding data processing apparatus generates a video material item marked copy by embedding a payload data word into the video material item. The video material item includes plural video...
US20130016828 PROTECTION OF A MODULAR EXPONENTIATION CALCULATION BY MULTIPLICATION BY A RANDOM QUANTITY  
A method for protecting a calculation, by an electronic circuit, of a modular exponentiation of a digital quantity, wherein: a first variable is initialized with a random quantity; at least one...
US20090245505 MULTIPLICATION CIRCUIT AND DE/ENCRYPTION CIRCUIT UTILIZING THE SAME  
A multiplication circuit generates a product of a matrix and a first scalar when in matrix mode and a product of a second scalar and a third scalar when in scalar mode. The multiplication circuit...
US20090103715 Rules-Driven Hash Building  
Methods and apparatus, including computer program products, implementing and using techniques for generating a hash. A data store including multiple hashing tables is provided. A set of data is...
US20090285388 Cryptographic Method with Elliptical Curves  
A method determines an elliptical curve, suitable for a cryptographic method. An elliptical curve to be tested is prepared. The order of a twisted elliptical curve associated with the elliptical...
US20100014675 Appraising Systems With Zero Knowledge Proofs  
A system, method, and computer program product are provided for requesting a proof of a security policy in a client system. Additionally, a system, method, and computer program product are...
US20090028323 ENHANCING THE SECURITY OF PUBLIC KEY CRYPTOSYSTEM IMPLEMENTATIONS  
In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase to populate a data structure. Then, a first random number multiplied by a...
US20080031447 SYSTEMS AND METHODS FOR AGGREGATION OF ACCESS TO NETWORK PRODUCTS AND SERVICES  
The present invention is directed to a method and computer system for access aggregation comprising the storage and retrieval of website userids and passwords, and potentially other information,...
US20100008505 Secret sharing technique with low overhead information content  
An apparatus and method for sharing a secret comprising the steps of generating a first random matrix, generating a first projection matrix from the first random matrix, and determining a first...
US20110091033 CRYPTOGRAPHIC SYSTEM  
A method of creating an encryption system for encrypting a plurality of plaintext words is provided. The method comprises associating (104) respective plaintext words (202) with respective sets...
US20120020476 Method for Performing a Cryptographic Task in an Electronic Hardware Component  
A method and apparatus are provided to perform a cryptographic task on at least one numerical datum in an electronic hardware component. The method includes a step of at least partial use of an...
US20050031120 Denial featured cryptography  
Daniel (alternatively written as DNL) is a cryptographic paradigm, featuring ease of matching: many plaintexts of choice to any give cipher (the deniability property). Consequently, the cipher...
US20100303229 MODIFIED COUNTER MODE ENCRYPTION  
A modified Counter Mode encryption technique encrypts data by receiving a seed value, generating a first value from an operation of the seed value and the plaintext; and encrypting the first value...
US20090129586 CRYPTOGRAPHIC MODULE MANAGEMENT APPARATUS, METHOD, AND PROGRAM  
A cryptographic module management apparatus searches for cryptographic module meta-information based on the category information of a requested cryptographic module and, if associated...
US20090086961 MONTGOMERY MASKED MODULAR MULTIPLICATION PROCESS AND ASSOCIATED DEVICE  
This invention concerns a Montgomery masked modular multiplication process and the associated device. The modular multiplication, in congruence n, includes at least a stage generating a...
US20050259814 Table masking for resistance to power analysis attacks  
Tables are defined to permit output masking for table look-ups to be carried out to resist power analysis attacks on cryptographic operations. A set of individually defined random values is used...
US20130129079 System And Method For Decryption Of Content Including Disconnected Encryption Chains  
Embodiments may include receiving a protected version of content including different encryption chains including encrypted blocks of content. The protected version of content may include...
US20100211798 Systems and Methods for Signaling Content Rights Through Release Windows Life Cycle  
Systems and methods for controlling the use of audio, video and audiovisual content are provided. A data structure includes content usage rights for multiple release windows. The usage rights may...
US20140328482 ENCRYPTION EVALUATION DEVICE, ENCRYPTION EVALUATION METHOD, AND ENCRYPTION EVALUATION PROGRAM  
An encryption evaluation device 100 is a device evaluating the security of a block cipher encrypting data of a predetermined size for each block by repeatedly executing, a predetermined number of...