Match

Document 
Document Title 

US20130315387 
ENCRYPTION METHOD CHARACTERIZED BY THREE DIMENSIONAL COMPUTATION, FEEDBACK CONTROL, AND DYNAMIC TRANSITION BOX
An encryption method adopts an encryption principle based on sequential logic and involves performing three dimensional computation on a plaintext data unit having undergone nonlinear transition... 

US20090074178 
Accelerating Scalar Multiplication On Elliptic Curve Cryptosystems Over Prime Fields
A method and apparatus for accelerating scalar multiplication in an elliptic curve cryptosystem (ECC) over prime fields is provided. Multiplication operations within an ECC point operation are... 

US20150244524 
SideChannelProtected Masking
The invention provides a method, in a processor, for executing a cryptographic computation. Upon the execution of the computation there is applied a base masking through which intermediate values... 

US20130208886 
METHOD OF PREVENTING FAULTINJECTION ATTACKS ON CHINESE REMAINDER THEOREMRIVEST SHAMIR ADLEMAN CRYPTOGRAPHIC OPERATIONS AND RECORDING MEDIUM FOR STORING PROGRAM IMPLEMENTING THE SAME
Disclosed herein are a method of preventing faultinjection attacks on Chinese Remainder Theorem (CRT)Rivest Shamir Adleman (RSA) cryptographic operations, and a recording medium for storing a... 

US20100014658 
METHOD OF CUSTOMIZING A SECURITY COMPONENT, NOTABLY IN AN UNPROTECTED ENVIRONMENT
The invention relates to a method of customizing a security component in an unprotected environment. The method according to embodiments of the invention includes: inserting a first secret K0 into... 

US20080181396 
DATA OBFUSCATION OF TEXT DATA USING ENTITY DETECTION AND REPLACEMENT
A data obfuscation method, apparatus and computer program product are disclosed in which at least selected text entities such as words or abbreviations in a document are obfuscated to prevent the... 

US20100046740 
EMBEDDING A SECRET IN A LARGER POLYNOMIAL
A secret polynomial is embedded in a larger polynomial. In one embodiment, the secret is represented as a secret polynomial of degree d over GF(q), q being a prime or a power of a prime. The... 

US20080144834 
Security System Communications Including Encryption
A security system (20) includes a plurality of sensors (2226) that provide an indication of a security condition to a corresponding plurality of microcontrollers (3236). Each microcontroller... 

US20110271105 
METHOD AND APPARATUS FOR IMPLEMENTING A NOVEL ONEWAY HASH FUNCTION ON HIGHLY CONSTRAINED DEVICES SUCH AS RFID TAGS
A method and apparatus for implementing a novel oneway hash function with provable security properties for authentication and nonauthentication applications on highly constrained devices, with... 

US20130003964 
Simultaneous Scalar Multiplication Method
In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in... 

US20110261956 
Simultaneous Scalar Multiplication Method
In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in... 

US20110280394 
FormatPreserving Encryption Via Rotating Block Encryption
Methods and systems are described for formatpreserving encryption. Formatpreserving encryption on an entire format F may be achieved by performing formatpreserving encryption on one or more... 

US20110142229 
APPARATUS AND METHOD FOR PERFORMING TRANSPARENT HASH FUNCTIONS
A method for performing hash operations including: receiving a hash instruction that prescribes one of the hash operations and one of a plurality of hash algorithms; translating the hash... 

US20080232597 
ITERATIVE SYMMETRIC KEY CIPHERS WITH KEYED SBOXES USING MODULAR EXPONENTIATION
Disclosed is the design and development of a new cipher called the Dragonfire Cipher. The Dragon cipher includes message authentication code and keyed random number generator. Dragonfire cipher... 

US20140341374 
METHOD OF GENERATING SECURE TOKENS AND TRANSMISSION BASED ON (TRNG) GENERATED TOKENS AND SPLIT INTO SHARES AND THE SYSTEM THEREOF
A method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares, the method comprising steps of generating the keys by a hardware based True Random... 

US20130202106 
Performing AES Encryption Or Decryption In Multiple Modes With A Single Instruction
A machinereadable medium may have stored thereon an instruction, which when executed by a machine causes the machine to perform a method. The method may include combining a first operand of the... 

US20090060176 
PROGRAM CONVERTER, ENCRYPTING DEVICE, AND ENCRYPTING METHOD
A program converter (1) converts a program (P) which performs arithmetic addition processing to execute encryption, into a converted program (tP) which performs processing equivalent to the... 

US20120189120 
SYSTEM AND METHOD FOR PROTECTING DATA OF MOBILE PHONE
In a method for protecting data of a mobile phone, the mobile phone includes a storage system. The storage system stores a plaintext file to be encrypted and an international mobile equipment... 

US20080205637 
THRESHOLD SECRET SHARING APPARATUS, THRESHOLD SECRET SHARING SCHEME, SECRET INFORMATION DECRYPTION METHOD, AND PROGRAM FOR THE SAME
A threshold secret sharing apparatus, a threshold secret sharing scheme, a secret information recovery apparatus a secret information recovery method, and a program thereof are provided using XOR... 

US20120002807 
WHITEBOX CRYPTOGRAPHIC SYSTEM WITH INPUT DEPENDENT ENCODINGS
A whitebox cryptographic system is presented wherein at least one of its internal values is represented using an input dependent encoding. The system comprises a network of a plurality of basic... 

US20120243679 
VERIFICATION DEVICE, SECRET INFORMATION RESTORATION DEVICE, VERIFICATION METHOD, PROGRAM, AND SECRET SHARING SYSTEM
A verification device, upon the input of any k items of shared information among n items of shared information and “t”: generates as subsets all combinations that select r items of shared... 

US20090268900 
SIGNED MONTGOMERY ARITHMETIC
A system and method configured for applying Montgomery style reduction directly to negative quantities as well as positive values, producing the new form which does not require conditional... 

US20060291647 
Encrypted communications
A communications system in which a sending computer encrypts a message using a key associated with the computer which is to receive the message; and the receiving computer uses a key associated... 

US20090003607 
ALTERING THE SIZE OF WINDOWS IN PUBLIC KEY CRYPTOGRAPHIC COMPUTATIONS
In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase. Then an exponentiation phase is performed, wherein the exponentiation phase... 

US20080056497 
METHOD OF GENERATING ANTICOLLUSION FINGERPRINT CODES USING
Disclosed herein is a method of generating anticollusion fingerprint codes using a (na, n2a−2, na−1, n, 0, 1) GDPBIBD. The fingerprint codes are generated using computer equipment that executes... 

US20130124849 
System And Method For Individualizing Content For A Consumer
Protected content that has been encrypted according to an encryption algorithm is individualized for a consumer according to pseudorandomlygenerated individualization data values and... 

US20100088521 
PUBLIC ENCRYPTED DISCLOSURE
Public encrypted disclosure provides a creation date verification system by making confidential information available in a secure encrypted form that can be decrypted at a later time to verify the... 

US20130062420 
METHOD AND SYSTEM FOR THE GENERATION AND VALIDATION OF PERSONAL IDENTIFICATION NUMBERS
A method and apparatus for encoding and decoding sequential index numbers to pseudorandom Personal Identification Codes (PINs) of varying word size in disclosed. The word size is defined by a... 

US20130016827 
PROTECTION OF A CALCULATION ON AN ELLIPTIC CURVE
A method for protecting a calculation on an elliptic curve, by an electronic circuit, wherein a point of an elliptic curve is multiplied by a digital quantity, comprising the steps of:... 

US20110142228 
APPARATUS AND METHOD FOR EMPLOYING CONFIGURABLE HASH ALGORITHMS
A method for performing hash operations including: receiving a hash instruction that is part of an application program, where the hash instruction prescribes one of the hash operations and one of... 

US20130114806 
METHOD FOR ENCRYPTING A MESSAGE THROUGH THE COMPUTATION OF MATHEMATICAL FUNCTIONS COMPRISING MODULAR MULTIPLICATIONS
An embodiment concerns a method for encrypting a message through a cryptographic algorithm including a computation of a mathematical function including the computation of one or more modular... 

US20100017614 
ENCODING AND DETECTING APPARATUS
An encoding data processing apparatus generates a video material item marked copy by embedding a payload data word into the video material item. The video material item includes plural video... 

US20130016828 
PROTECTION OF A MODULAR EXPONENTIATION CALCULATION BY MULTIPLICATION BY A RANDOM QUANTITY
A method for protecting a calculation, by an electronic circuit, of a modular exponentiation of a digital quantity, wherein: a first variable is initialized with a random quantity; at least one... 

US20090245505 
MULTIPLICATION CIRCUIT AND DE/ENCRYPTION CIRCUIT UTILIZING THE SAME
A multiplication circuit generates a product of a matrix and a first scalar when in matrix mode and a product of a second scalar and a third scalar when in scalar mode. The multiplication circuit... 

US20090103715 
RulesDriven Hash Building
Methods and apparatus, including computer program products, implementing and using techniques for generating a hash. A data store including multiple hashing tables is provided. A set of data is... 

US20090285388 
Cryptographic Method with Elliptical Curves
A method determines an elliptical curve, suitable for a cryptographic method. An elliptical curve to be tested is prepared. The order of a twisted elliptical curve associated with the elliptical... 

US20100014675 
Appraising Systems With Zero Knowledge Proofs
A system, method, and computer program product are provided for requesting a proof of a security policy in a client system. Additionally, a system, method, and computer program product are... 

US20090028323 
ENHANCING THE SECURITY OF PUBLIC KEY CRYPTOSYSTEM IMPLEMENTATIONS
In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase to populate a data structure. Then, a first random number multiplied by a... 

US20080031447 
SYSTEMS AND METHODS FOR AGGREGATION OF ACCESS TO NETWORK PRODUCTS AND SERVICES
The present invention is directed to a method and computer system for access aggregation comprising the storage and retrieval of website userids and passwords, and potentially other information,... 

US20100008505 
Secret sharing technique with low overhead information content
An apparatus and method for sharing a secret comprising the steps of generating a first random matrix, generating a first projection matrix from the first random matrix, and determining a first... 

US20110091033 
CRYPTOGRAPHIC SYSTEM
A method of creating an encryption system for encrypting a plurality of plaintext words is provided. The method comprises associating (104) respective plaintext words (202) with respective sets... 

US20120020476 
Method for Performing a Cryptographic Task in an Electronic Hardware Component
A method and apparatus are provided to perform a cryptographic task on at least one numerical datum in an electronic hardware component. The method includes a step of at least partial use of an... 

US20050031120 
Denial featured cryptography
Daniel (alternatively written as DNL) is a cryptographic paradigm, featuring ease of matching: many plaintexts of choice to any give cipher (the deniability property). Consequently, the cipher... 

US20100303229 
MODIFIED COUNTER MODE ENCRYPTION
A modified Counter Mode encryption technique encrypts data by receiving a seed value, generating a first value from an operation of the seed value and the plaintext; and encrypting the first value... 

US20090129586 
CRYPTOGRAPHIC MODULE MANAGEMENT APPARATUS, METHOD, AND PROGRAM
A cryptographic module management apparatus searches for cryptographic module metainformation based on the category information of a requested cryptographic module and, if associated... 

US20090086961 
MONTGOMERY MASKED MODULAR MULTIPLICATION PROCESS AND ASSOCIATED DEVICE
This invention concerns a Montgomery masked modular multiplication process and the associated device. The modular multiplication, in congruence n, includes at least a stage generating a... 

US20050259814 
Table masking for resistance to power analysis attacks
Tables are defined to permit output masking for table lookups to be carried out to resist power analysis attacks on cryptographic operations. A set of individually defined random values is used... 

US20130129079 
System And Method For Decryption Of Content Including Disconnected Encryption Chains
Embodiments may include receiving a protected version of content including different encryption chains including encrypted blocks of content. The protected version of content may include... 

US20100211798 
Systems and Methods for Signaling Content Rights Through Release Windows Life Cycle
Systems and methods for controlling the use of audio, video and audiovisual content are provided. A data structure includes content usage rights for multiple release windows. The usage rights may... 

US20140328482 
ENCRYPTION EVALUATION DEVICE, ENCRYPTION EVALUATION METHOD, AND ENCRYPTION EVALUATION PROGRAM
An encryption evaluation device 100 is a device evaluating the security of a block cipher encrypting data of a predetermined size for each block by repeatedly executing, a predetermined number of... 