Match

Document 
Document Title 

US20110311054 
Asymmetrical Chaotic Encryption
Implementations and techniques for asymmetrical chaotic encryption are generally disclosed. One disclosed method for asymmetrical encryption includes determining a ciphertext control block from... 

US20090086976 
SUBSTITUTION TABLE MASKING FOR CRYPTOGRAPHIC PROCESSES
A computing deviceimplemented method and system is provided for obtaining an interim masked substitution table value for a given input component in a cryptographic round, such as an AES... 

US20100172492 
METHOD FOR SCHEDULING ELLIPTIC CURVE CRYPTOGRAPHY COMPUTATION
A scheduling method for ECC computation processed in a plurality of arithmetic units comprises a coarsegrained scheduling step for systematically scheduling an ECC computation operation and a... 

US20090327141 
HIGHLY EFFICIENT SECRECYPRESERVING PROOFS OF CORRECTNESS OF COMPUTATION
Presented are methods and systems for highly efficient proofs of correctness of computations that preserve secrecy of the input values and calculations. One embodiment includes a method for... 

US20100329446 
LOGIC CIRCUIT AND METHOD FOR CALCULATING AN ENCRYPTED RESULT OPERAND
A logic circuit for calculating an encrypted dualrail result operand from encrypted dualrail input operands according to a combination rule includes inputs for receiving the input operands and... 

US20090122980 
Cryptographic Method for Securely Implementing an Exponentiation, and an Associated Component
An asymmetrical cryptographic method applied to a message M includes a private operation of signing or decrypting the message M to obtain a signed or decrypted message s. The private operation is... 

US20100246811 
SYSTEMS AND METHODS FOR INFORMATION SECURITY USING ONETIME PAD
A method of verifying a password and methods of encryption and decryption using a key generated from a onetime pad. In one embodiment, the method of verifying includes: (1) receiving a password... 

US20080181399 
COMPOSITE CRYPTOGRAPHIC ACCELERATOR AND HARDWARE SECURITY MODULE
The functionality of a hardware security module is combined with that of a cryptographic accelerator in a single device. A single device comprising a hardware security module configured to... 

US20140254792 
Masked Nonlinear Feedback Shift Register
An NLFSR of length k, configured to output a sequence of masked values xi′=xi+mi according to a masked recurrence xn+k′=f(xn′, . . . , xn+k−1′), the NLFSR including a nonlinear feedback function... 

US20110033041 
INDEXBASED CODING WITH A PSEUDORANDOM SOURCE
Outputs from at least one pseudorandom source are used to encode hidden value. The hidden value is encoded using index based quantities, for example, based on numerically ordering a sequence of... 

US20120002804 
ARCHITECTURE AND INSTRUCTION SET FOR IMPLEMENTING ADVANCED ENCRYPTION STANDARD (AES)
A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A... 

US20100080395 
CRYPTOGRAPHIC METHOD FOR A WHITEBOX IMPLEMENTATION
A cryptographic method is implemented in a whitebox implementation thereof. The method comprises applying a plurality of transformations (802) each replacing an input word by an output word, and... 

US20140233730 
Multiple transform utilization and application for secure digital watermarking
Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed... 

US20140226811 
Multiple transform utilization and application for secure digital watermarking
Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed... 

US20070195952 
Method And System For Computational Transformation
The invention generally relates to computational transformation process, which has applications in cryptography, random number generation, hash code generation etc. The computational... 

US20100322412 
METHOD AND PROCESSING CIRCUIT FOR DEALING WITH GALOIS FIELD COMPUTATION
A method for dealing with Galois Field computation includes: providing an operating circuit which has at least a multiplicative inverse unit; and using the multiplicative inverse unit to execute... 

US20080075276 
Method for controlling the switch of the electronic device
A method for controlling the switch of the electronic device includes the following steps: Step (a): Providing a portable cipher code generating device and an electronic device; the cipher code... 

US20100027780 
Systems and methods for anonymizing personally identifiable information associated with epigenetic information
Methods and devices are described for anonymizing personally identifiable information associated with epigenetic information. 

US20140016774 
INSTRUCTIONS TO PERFORM GROESTL HASHING
A method is described. The method includes executing an instruction to perform one or more Galois Field (GF) multiply by 2 operations on a state matrix and executing an instruction to combine... 

US20120027198 
System and method for cryptographic communications using permutation
The present invention discloses a system and method for cryptographic communications. It may significantly improve operation efficiency of existing symbol level encryption algorithms by... 

US20080063186 
DETECTION AND HANDLING OF ENCRYPTION KEY AND INITIALIZATION VECTOR
Provided are a method, system, and article of manufacture that maintains, at a decryption unit, and expected key identifier and an expected initialization vector. A key identifier and an... 

US20090319801 
SecurityEnhanced Storage Devices Using Media Location Factor in Encryption of Hidden and NonHidden Partitions
Methods and devices for increasing or hardening the security of data stored in a storage device, such as a hard disk drive, are described. A storage device provides for increased or hardened... 

US20120281826 
RESILIENT CRYPTOGRAPHIC SCHEME
A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the... 

US20080025499 
Electronic Mail Management Device
An internet facsimile terminal. An output control part determines whether a received electronic mail is encrypted. If the electronic mail is not encrypted, the output control part controls an... 

US20100217986 
AUTHENTICATED SECRET SHARING
A method and system distributes N shares of a secret among cooperating entities by forming a mathematical construct that has an embedded internal structure to allow authentication of a... 

US20070064930 
Modular exponentiation with randomized exponent
For the determination of a result of a modular exponentiation, a randomization auxiliary number is employed for the randomization of the exponent on the basis of the product of the public key and... 

US20120121081 
NONLINEAR FEEDBACK SHIFT REGISTER AND METHOD FOR NONLINEAR SIGNATURE FORMATION
A nonlinear feedback shift register for creating a signature for cryptographic applications includes a sequence of seriesconnected flipflops which are connected to each other for forming at... 

US20090092246 
Calculation apparatus and encrypt and decrypt processing apparatus
A calculation apparatus capable of executing any of a first calculating process operation including a first matrix calculation, and a second calculating process operation including a second matrix... 

US20110129084 
METHOD OF EXECUTING AN ALGORITHM FOR PROTECTING AN ELECTRONIC DEVICE BY AFFINE MASKING AND ASSOCIATED DEVICE
A method of executing an algorithm includes protecting an electronic device by affine masking. The electronic device executes operations on secret variables x, the secret variables x being binary... 

US20080260143 
XZELLIPTIC CURVE CRYPTOGRAPHY WITH SECRET KEY EMBEDDING
Secure communications over an insecure channel is provided using symmetric key elliptic curve cryptography. More specifically, a shared secret key and/or data bit string is embedded in the... 

US20090052665 
Bulk Data Erase Utilizing An Encryption Technique
A system and a computer program product are disclosed for eliminating access to data on removable storage media of a removable storage media cartridge. The system comprises a data storage drive... 

US20140192973 
ENCRYPTION PROCESSING APPARATUS, ENCRYPTION PROCESSING METHOD, AND COMPUTER PROGRAM
A commonkey blockcipher processing configuration with enhanced immunity against attacks such as saturation attacks and algebraic attacks (XSL attacks) is realized. In an encryption processing... 

US20080170700 
SYSTEM FOR CONTROLLING ACCESS TO DIGITAL INFORMATION
Described is a method for renting or selling digital content, and a corresponding system for carrying out the method. The method includes the steps of providing a digital content storage device... 

US20150131795 
CRYPTOGRAPHIC HASH GENERATION SYSTEM
A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third... 

US20100091986 
Information Management System and Encryption System
A system capable of surely preventing a theft or leak of information which comprises: an information registration destination decision unit deciding registration destinations of information; a... 

US20100135484 
HASH VALUE CALCULATION APPARATUS AND METHOD THEREOF
A hash value calculation apparatus, which calculates a hash value of a message, includes: an input unit adapted to input an extended block obtained from a message to be processed; a hash value... 

US20090110188 
CONFIGURABLE RANDOM NUMBER GENERATOR
A method for random number generation includes generating random number sequences using a Random Number Generator (RNG) circuit having an externallymodifiable configuration. The RNG circuit... 

US20090003606 
CHANGING THE ORDER OF PUBLIC KEY CRYPTOGRAPHIC COMPUTATIONS
In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase. This may be accomplished by creating a permutation of an order of powers and... 

US20120002806 
Digital Signatures
Digital signature generation apparatus, comprising an envelope generator operable to generate an envelope representation, of only one polarity, of a sampled data segment, and operable for each of... 

US20090022315 
SECURITY MODULE FOR SECURING AN ENCRYPTED SIGNAL WITH SYSTEM AND METHOD FOR USE THEREWITH
A security module includes a signal interface for receiving an encrypted signal and a host interface that is coupleable to a host. A processing module is operable to receive encrypted decryption... 

US20080267393 
AES DECRYPTION APPARATUS AND PROGRAM
When a matrix operation based on the specifications of inverse mixcolumn transformation InvMixColumns( ) of AES decryption is executed by the product of a first matrix Pb and a second matrix Pa,... 

US20100329449 
ADJUSTMENTVALUEATTACHED BLOCK CIPHER APPARATUS, CIPHER GENERATION METHOD AND RECORDING MEDIUM
There is provided an adjustmentvalueattached block cipher apparatus realizing block cipher processing that the amount of processing is small in adjustmentvalueattached block cipher. The... 

US20100226497 
COMMUNICATIONS SYSTEM EMPLOYING ORTHOGONAL CHAOTIC SPREADING CODES
Systems and methods for codedivision multiplex communications. The methods involve forming orthogonal or statistically orthogonal chaotic spreading sequences (CSC1,1, CSCD,1), each comprising a... 

US20100241493 
COMPUTERIZED VOTING SYSTEM
Any business, individuals, groups of people, or government that is Officially facilitating the voting process use sources of computer data and other data to create lists of every eligible Voter.... 

US20070297601 
Modular reduction using folding
Techniques are described to determine N mod M, where N is a number having a width of nbits, and M is a number having a width of mbits. The techniques, generally, involve determining N′=NH2f mod... 

US20080137868 
Distributed encryption methods and systems
A method and system for providing communication over arbitrary distances with a desired probability of security is disclosed. In accordance with one embodiment of the invention shares of a random... 

US20140119538 
METHOD AND DEVICE FOR 3D OBJECT ENCRYPTION BY APPLICATION OF A FUNCTION MODIFIED USING A SECRET KEY
A method for encrypting a 3D object. In a preferred embodiment, the encryption shapes the 3D object by generating a set of secret functions using a secret K, applying the generated functions to... 

US20100111294 
VERIFICATION OF MOVEMENT OF ITEMS
A method, apparatus and system for verifying a route taken during movement of an RFID tag (4) between different entities of an authorized route. The method comprises: first verification apparatus... 

US20070160197 
Secret information management scheme based on secret sharing scheme
In a secret information management system for managing a secret information of a user, the secret information is divided into a plurality of divided data by using a secret sharing scheme, such... 

US20080177812 
HASH ALGORITHM USING RANDOMIZATION FUNCTION
A pseudorandom number generator is employed to provide the same results normally produced by hash functions. In particular, input character string data is employed to sequentially adjust the seed... 