AcclaimIP-ad

Match Document Document Title
US20110311054 Asymmetrical Chaotic Encryption  
Implementations and techniques for asymmetrical chaotic encryption are generally disclosed. One disclosed method for asymmetrical encryption includes determining a ciphertext control block from...
US20090086976 SUBSTITUTION TABLE MASKING FOR CRYPTOGRAPHIC PROCESSES  
A computing device-implemented method and system is provided for obtaining an interim masked substitution table value for a given input component in a cryptographic round, such as an AES...
US20100172492 METHOD FOR SCHEDULING ELLIPTIC CURVE CRYPTOGRAPHY COMPUTATION  
A scheduling method for ECC computation processed in a plurality of arithmetic units comprises a coarse-grained scheduling step for systematically scheduling an ECC computation operation and a...
US20090327141 HIGHLY EFFICIENT SECRECY-PRESERVING PROOFS OF CORRECTNESS OF COMPUTATION  
Presented are methods and systems for highly efficient proofs of correctness of computations that preserve secrecy of the input values and calculations. One embodiment includes a method for...
US20100329446 LOGIC CIRCUIT AND METHOD FOR CALCULATING AN ENCRYPTED RESULT OPERAND  
A logic circuit for calculating an encrypted dual-rail result operand from encrypted dual-rail input operands according to a combination rule includes inputs for receiving the input operands and...
US20090122980 Cryptographic Method for Securely Implementing an Exponentiation, and an Associated Component  
An asymmetrical cryptographic method applied to a message M includes a private operation of signing or decrypting the message M to obtain a signed or decrypted message s. The private operation is...
US20100246811 SYSTEMS AND METHODS FOR INFORMATION SECURITY USING ONE-TIME PAD  
A method of verifying a password and methods of encryption and decryption using a key generated from a one-time pad. In one embodiment, the method of verifying includes: (1) receiving a password...
US20080181399 COMPOSITE CRYPTOGRAPHIC ACCELERATOR AND HARDWARE SECURITY MODULE  
The functionality of a hardware security module is combined with that of a cryptographic accelerator in a single device. A single device comprising a hardware security module configured to...
US20140254792 Masked Nonlinear Feedback Shift Register  
An NLFSR of length k, configured to output a sequence of masked values xi′=xi+mi according to a masked recurrence xn+k′=f(xn′, . . . , xn+k−1′), the NLFSR including a nonlinear feedback function...
US20110033041 INDEX-BASED CODING WITH A PSEUDO-RANDOM SOURCE  
Outputs from at least one pseudo-random source are used to encode hidden value. The hidden value is encoded using index based quantities, for example, based on numerically ordering a sequence of...
US20120002804 ARCHITECTURE AND INSTRUCTION SET FOR IMPLEMENTING ADVANCED ENCRYPTION STANDARD (AES)  
A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A...
US20100080395 CRYPTOGRAPHIC METHOD FOR A WHITE-BOX IMPLEMENTATION  
A cryptographic method is implemented in a white-box implementation thereof. The method comprises applying a plurality of transformations (802) each replacing an input word by an output word, and...
US20140233730 Multiple transform utilization and application for secure digital watermarking  
Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed...
US20140226811 Multiple transform utilization and application for secure digital watermarking  
Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed...
US20070195952 Method And System For Computational Transformation  
The invention generally relates to computational transformation process, which has applications in cryptography, random number generation, hash code generation etc. The computational...
US20100322412 METHOD AND PROCESSING CIRCUIT FOR DEALING WITH GALOIS FIELD COMPUTATION  
A method for dealing with Galois Field computation includes: providing an operating circuit which has at least a multiplicative inverse unit; and using the multiplicative inverse unit to execute...
US20080075276 Method for controlling the switch of the electronic device  
A method for controlling the switch of the electronic device includes the following steps: Step (a): Providing a portable cipher code generating device and an electronic device; the cipher code...
US20100027780 Systems and methods for anonymizing personally identifiable information associated with epigenetic information  
Methods and devices are described for anonymizing personally identifiable information associated with epigenetic information.
US20140016774 INSTRUCTIONS TO PERFORM GROESTL HASHING  
A method is described. The method includes executing an instruction to perform one or more Galois Field (GF) multiply by 2 operations on a state matrix and executing an instruction to combine...
US20120027198 System and method for cryptographic communications using permutation  
The present invention discloses a system and method for cryptographic communications. It may significantly improve operation efficiency of existing symbol level encryption algorithms by...
US20080063186 DETECTION AND HANDLING OF ENCRYPTION KEY AND INITIALIZATION VECTOR  
Provided are a method, system, and article of manufacture that maintains, at a decryption unit, and expected key identifier and an expected initialization vector. A key identifier and an...
US20090319801 Security-Enhanced Storage Devices Using Media Location Factor in Encryption of Hidden and Non-Hidden Partitions  
Methods and devices for increasing or hardening the security of data stored in a storage device, such as a hard disk drive, are described. A storage device provides for increased or hardened...
US20120281826 RESILIENT CRYPTOGRAPHIC SCHEME  
A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the...
US20080025499 Electronic Mail Management Device  
An internet facsimile terminal. An output control part determines whether a received electronic mail is encrypted. If the electronic mail is not encrypted, the output control part controls an...
US20100217986 AUTHENTICATED SECRET SHARING  
A method and system distributes N shares of a secret among cooperating entities by forming a mathematical construct that has an embedded internal structure to allow authentication of a...
US20070064930 Modular exponentiation with randomized exponent  
For the determination of a result of a modular exponentiation, a randomization auxiliary number is employed for the randomization of the exponent on the basis of the product of the public key and...
US20120121081 NONLINEAR FEEDBACK SHIFT REGISTER AND METHOD FOR NONLINEAR SIGNATURE FORMATION  
A nonlinear feedback shift register for creating a signature for cryptographic applications includes a sequence of series-connected flip-flops which are connected to each other for forming at...
US20090092246 Calculation apparatus and encrypt and decrypt processing apparatus  
A calculation apparatus capable of executing any of a first calculating process operation including a first matrix calculation, and a second calculating process operation including a second matrix...
US20110129084 METHOD OF EXECUTING AN ALGORITHM FOR PROTECTING AN ELECTRONIC DEVICE BY AFFINE MASKING AND ASSOCIATED DEVICE  
A method of executing an algorithm includes protecting an electronic device by affine masking. The electronic device executes operations on secret variables x, the secret variables x being binary...
US20080260143 XZ-ELLIPTIC CURVE CRYPTOGRAPHY WITH SECRET KEY EMBEDDING  
Secure communications over an insecure channel is provided using symmetric key elliptic curve cryptography. More specifically, a shared secret key and/or data bit string is embedded in the...
US20090052665 Bulk Data Erase Utilizing An Encryption Technique  
A system and a computer program product are disclosed for eliminating access to data on removable storage media of a removable storage media cartridge. The system comprises a data storage drive...
US20140192973 ENCRYPTION PROCESSING APPARATUS, ENCRYPTION PROCESSING METHOD, AND COMPUTER PROGRAM  
A common-key blockcipher processing configuration with enhanced immunity against attacks such as saturation attacks and algebraic attacks (XSL attacks) is realized. In an encryption processing...
US20080170700 SYSTEM FOR CONTROLLING ACCESS TO DIGITAL INFORMATION  
Described is a method for renting or selling digital content, and a corresponding system for carrying out the method. The method includes the steps of providing a digital content storage device...
US20150131795 CRYPTOGRAPHIC HASH GENERATION SYSTEM  
A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third...
US20100091986 Information Management System and Encryption System  
A system capable of surely preventing a theft or leak of information which comprises: an information registration destination decision unit deciding registration destinations of information; a...
US20100135484 HASH VALUE CALCULATION APPARATUS AND METHOD THEREOF  
A hash value calculation apparatus, which calculates a hash value of a message, includes: an input unit adapted to input an extended block obtained from a message to be processed; a hash value...
US20090110188 CONFIGURABLE RANDOM NUMBER GENERATOR  
A method for random number generation includes generating random number sequences using a Random Number Generator (RNG) circuit having an externally-modifiable configuration. The RNG circuit...
US20090003606 CHANGING THE ORDER OF PUBLIC KEY CRYPTOGRAPHIC COMPUTATIONS  
In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase. This may be accomplished by creating a permutation of an order of powers and...
US20120002806 Digital Signatures  
Digital signature generation apparatus, comprising an envelope generator operable to generate an envelope representation, of only one polarity, of a sampled data segment, and operable for each of...
US20090022315 SECURITY MODULE FOR SECURING AN ENCRYPTED SIGNAL WITH SYSTEM AND METHOD FOR USE THEREWITH  
A security module includes a signal interface for receiving an encrypted signal and a host interface that is coupleable to a host. A processing module is operable to receive encrypted decryption...
US20080267393 AES DECRYPTION APPARATUS AND PROGRAM  
When a matrix operation based on the specifications of inverse mixcolumn transformation InvMixColumns( ) of AES decryption is executed by the product of a first matrix Pb and a second matrix Pa,...
US20100329449 ADJUSTMENT-VALUE-ATTACHED BLOCK CIPHER APPARATUS, CIPHER GENERATION METHOD AND RECORDING MEDIUM  
There is provided an adjustment-value-attached block cipher apparatus realizing block cipher processing that the amount of processing is small in adjustment-value-attached block cipher. The...
US20100226497 COMMUNICATIONS SYSTEM EMPLOYING ORTHOGONAL CHAOTIC SPREADING CODES  
Systems and methods for code-division multiplex communications. The methods involve forming orthogonal or statistically orthogonal chaotic spreading sequences (CSC1,1, CSCD,1), each comprising a...
US20100241493 COMPUTERIZED VOTING SYSTEM  
Any business, individuals, groups of people, or government that is Officially facilitating the voting process use sources of computer data and other data to create lists of every eligible Voter....
US20070297601 Modular reduction using folding  
Techniques are described to determine N mod M, where N is a number having a width of n-bits, and M is a number having a width of m-bits. The techniques, generally, involve determining N′=NH2f mod...
US20080137868 Distributed encryption methods and systems  
A method and system for providing communication over arbitrary distances with a desired probability of security is disclosed. In accordance with one embodiment of the invention shares of a random...
US20140119538 METHOD AND DEVICE FOR 3D OBJECT ENCRYPTION BY APPLICATION OF A FUNCTION MODIFIED USING A SECRET KEY  
A method for encrypting a 3D object. In a preferred embodiment, the encryption shapes the 3D object by generating a set of secret functions using a secret K, applying the generated functions to...
US20100111294 VERIFICATION OF MOVEMENT OF ITEMS  
A method, apparatus and system for verifying a route taken during movement of an RFID tag (4) between different entities of an authorized route. The method comprises: first verification apparatus...
US20070160197 Secret information management scheme based on secret sharing scheme  
In a secret information management system for managing a secret information of a user, the secret information is divided into a plurality of divided data by using a secret sharing scheme, such...
US20080177812 HASH ALGORITHM USING RANDOMIZATION FUNCTION  
A pseudo-random number generator is employed to provide the same results normally produced by hash functions. In particular, input character string data is employed to sequentially adjust the seed...