Match Document Document Title
US20110066859 FLEXIBLE BROADCAST AUTHENTICATION IN RESOURCE-CONSTRAINED SYSTEMS: PROVIDING A TRADEOFF BETWEEN COMMUNICATION AND COMPUTATIONAL OVERHEADS  
A method for authenticating a message that is transmitted wirelessly. The method includes providing a set of private key values that define a private key and performing a key pair generation...
US20120045050 Apparatus and method for block cipher process for insecure environments  
Method and apparatus for increasing security of a cryptographic algorithm such as deciphering, enciphering, or a digital signature using a block type cipher such as AES implemented for instance in...
US20080069337 SYSTEM AND METHOD FOR MULTI-PRECISION DIVISION  
The present disclosure provides a system and method for performing multi-precision division. A method according to one embodiment may include generating a first product by multiplying a modulus...
US20090323938 Mechanism for transport-safe codings for cryptographic use  
In one embodiment, a mechanism for transport-safe codings for cryptographic use is disclosed. In one embodiment, a method for transport-safe coding for cryptographic use includes converting an...
US20110200187 Elliptic polynomial cryptography with secret key embedding  
Elliptic polynomial cryptography with secret key embedding is a method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of...
US20130142324 DEVICE AND AUTHENTICATION METHOD THEREFOR  
According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session...
US20140376717 METHOD AND UNIQUE CRYPTOGRAPHIC DEVICE WITH A PHYSICALLY UNCLONABLE FUNCTION  
A method and a cryptographic device for encrypting/decrypting an input message by using an algorithm having as entries, said input message, a cryptographic key, and a complementary unique value...
US20140105381 METHOD FOR GENERIC-POINT PARALLEL ELLIPTIC CURVE SCALAR MULTIPLICATION  
The method for generic-point parallel elliptic curve scalar multiplication replaces the pre-computation overhead of conventional elliptic curve scalar multiplication by post-computations that can...
US20090180609 Modular Reduction Using a Special Form of the Modulus  
A special form of a modulus and a modified Barrett reduction method are used to perform modular arithmetic in a cryptographic system. The modified Barrett reduction is a method of reducing a...
US20050207571 Data cipher processors, AES cipher systems, and AES cipher methods using a masking method  
Data cipher processors, advanced encryption standard (AES) cipher system, and AES cipher methods using a masking method perform round operations using a round key, a plain text, a cipher text, and...
US20100067690 SPA-RESISTANT LEFT-TO-RIGHT RECODING AND UNIFIED SCALAR MULTIPLICATION METHODS  
Provided is a scalar multiplication method unified with a simple power analysis (SPA) resistant left-to-right recording in a crypto system based on an elliptic curve and a pairing. The scalar...
US20130142326 PARALLEL ENCRYPTION/DECRYPTION  
The present disclosure includes methods and devices for parallel encryption/decryption. In one or more embodiments, an encryption/decryption device includes an input logic circuit, an output logic...
US20120189116 Technique for Determining Usage of Encrypted Media Content  
A technique for determining usage of encrypted media content is described. A method implementation of this technique comprises the steps of obtaining a short-term key for decrypting the media...
US20090016523 Masking and Additive Decomposition Techniques for Cryptographic Field Operations  
Masking and additive decomposition techniques are used to mask secret material used in field operations (e.g., point multiplication operations) performed by cryptographic processes (e.g., elliptic...
US20100189261 METHOD AND SYSTEM FOR EXTENDING ADVANCED ENCRYPTION STANDARD (AES) OPERATIONS FOR ENHANCED SECURITY  
In a wireless communication system, a method and system for extending Advanced Encryption Standard (AES) operations for enhanced security are provided. In an AES encryption operation, an initial...
US20090296922 WATERMARKING COMPUTER CODE BY EQUIVALENT MATHEMATICAL EXPRESSIONS  
A method of embedding information in a computer program code, including a plurality of program statements. The method comprises: parsing the computer program code to identify at least one program...
US20130142328 ENCRYPTION DEVICE, ENCRYPTION SYSTEM, ENCRYPTION METHOD, AND ENCRYPTION PROGRAM  
The object is to enable cipher communication even when a cipher key in a one-time pad cipher (Vernam cipher) is running short. A one-time pad encrypting part encrypts communication data by the...
US20080137856 METHOD FOR GENERATING INDIRECT TRUST BINDING BETWEEN PEERS IN PEER-TO-PEER NETWORK  
Provided is a method for generating indirect trust binding between peers in a P2P network that allows communication and interaction between peers with trust even without an integrated processing...
US20090296928 Pseudorandom number generating system, encryption system, and decryption system  
The present invention provides a pseudorandom number generating system, an encryption system, and a decryption system. The pseudorandom number generating system of the present invention repeatedly...
US20120140919 DIGITAL CONTENT MANAGEMENT SYSTEM, DIGITAL WATERMARK EMBEDDING DEVICE, DIGITAL WATERMARK DETECTION DEVICE, PROGRAM, AND DIGITAL CONTENT MANAGEMENT METHOD  
A digital content management system (1) includes a digital watermark embedding device (100) which generates a file having a file name used as a digital watermark, and embeds it into a digital...
US20060083370 RSA with personalized secret  
The present invention creates flexibility into the RSA cryptography. The goal is achieved by allowing a user to select a personalized secret such as a password to derive an exponent that functions...
US20100166175 Cryptographic hash functions using elliptic polynomial cryptography  
The cryptographic hash functions using of elliptic polynomial polynomials are based on the elliptic polynomial discrete logarithm problem, which is well known as a computationally hard problem....
US20070110228 CONTROLLING DATABASE COPYRIGHTS  
Briefly, in accordance with one or more embodiments, copyrights of digital data may be controlled.
US20050084098 Method of obscuring cryptographic computations  
Obscuring cryptographic computations may be accomplished by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the...
US20110228927 Cryptographic Method of Multilayer Diffusion in Multidimension  
The invention provides a diffusion function working on a multidimensional diffusion-area (plaintext/ciphertext), in which a multidimensional medium is meanwhile overlapped to the diffusion-area;...
US20070206785 EMA protection of a calculation by an electronic circuit  
A method for masking a digital quantity used by a calculation executed by an electronic circuit and including several iterations, each including at least one operation which is a function of at...
US20080273694 Combining Interleaving with Fixed-Sequence Windowing in an Elliptic Curve Scalar Multiplication  
An Elliptic Curve scalar multiplication product involving a scalar and a base point is determined in a manner that acts as a countermeasure to side channel attacks. A key splitting strategy called...
US20070071234 Methods for the storage and reading of a content, of the type implementing a content protection protocol, corresponding source, storage and sink devices  
A method for the storage of a content from a source device to a storage device, the devices implementing a content protection protocol comprising a phase of exchanging a first encryption key (Kc)...
US20130129085 System And Method For Decryption Of Content Including Partial-Block Discard  
Embodiments may include receiving a protected version of content that includes multiple encryption chains each including encrypted blocks of content. The protected version of content may include...
US20100215172 SHARING A SECRET WITH MODULAR INVERSES  
A method and system distributes N shares of a secret among cooperating entities by calculating the multiplicative inverses of the secret. In one embodiment, a distributor selects N distinct prime...
US20080013715 Cryptography processing units and multiplier  
In general, in one aspect, the disclosure describes a system including multiple programmable processing units, a dedicated hardware multiplier, and at least one bus connecting the multiple...
US20120087490 Method And Arrangement For Protecting File-Based Information  
The invention represents a method for creating a ciphertext block from a plaintext block consisting of more than one consecutive plaintext character strings (M1, M2, . . . Mn), which are encrypted...
US20060062383 Encryption/decryption management method in computer system having storage hierarchy  
When a computer system including a data storage apparatus having a data storage area storing encrypted data is modified to have plural encryption/decryption units, a computer cannot appropriately...
US20120124374 SECURED ACKNOWLEDGE PROTOCOL FOR AUTOMOTIVE REMOTE KEYLESS ENTRY SYSTEMS AND FOR NETWORKED SENSOR DEVICES  
A method for generating a secure acknowledgment message that involves constructing a plaintext of the acknowledgment message, computing a cyclic redundancy check (CRC) value for the plaintext of...
US20090310776 INFORMATION CONCEALMENT METHOD AND INFORMATION CONCEALMENT DEVICE  
An information concealment method comprising: a splitting step to split information into an encryption segment to be encrypted and a non-encryption segment not to be encrypted according to a...
US20060050868 Protected cryptographic calculation  
In a method for protected execution of a cryptographic calculation in which a key (12) with at least two key parameters (p, q, pinv, sp, dp, sq, dq) is drawn on, an integrity check (30, 34, 40,...
US20150030153 REPEATABLE APPLICATION-SPECIFIC ENCRYPTION KEY DERIVATION USING A HIDDEN ROOT KEY  
Embodiments of an invention for repeatable application-specific encryption key derivation are disclosed. In one embodiment, a processor includes a root key, an encryption engine, and execution...
US20090300349 VALIDATION SERVER, VALIDATION METHOD, AND PROGRAM  
A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module...
US20090046848 Encryption management system  
Systems and methods are presented for increasing the security of transmitted message. A text selection component selects at least one portion of a document that contains sensitive information. A...
US20070165842 Process and highly secure system for the distribution of audiovisual streams  
A process for distributing audiovisual sequences according to an original stream format having a succession of frames, the original stream on which an analysis is made, prior to transmission to...
US20060083371 Management messages transmission method by a management center intended to a plurality of multimedia units  
The present invention relates to a management messages transmission method by a management center intended to a plurality of multimedia units. Each unit has a security module (SC) comprising at...
US20080063188 Encoding device for error correction, encoding method for error correction and encoding program for error correction  
The present invention aims at providing an encoding device for error correction, encoding method for error correction and encoding program for error correction wherein countermeasures against...
US20140369493 Method For Validating A Cryptographic Parameter And Corresponding Device  
An electronic device is proposed, which is configured to receive at least one cryptographic parameter and validate the at least one cryptographic parameter. The electronic device is is configured...
US20110116627 Fast Key-changing Hardware Apparatus for AES Block Cipher  
A fast key-changing hardware apparatus, which generates one sub-key each clock cycle, which is used by advanced encryption system (AES) algorithm block cipher, is independent from the AES...
US20090175441 METHOD FOR PROTECTING DATA AGAINST DIFFERNTIAL FAULT ANALYSIS INVOLVED IN RIVEST, SHAMIR, AND ADLEMAN CRYPTOGRAPHY USING THE CHINESE REMAINDER THEOREM  
Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman (“RSA”) cryptography using the Chinese Remainder Theorem (“CRT”) are...
US20070053508 Security setting method of wireless communication network, security setting program, wireless communication network system and client device  
Method, program, network system and client device for security setting of wireless communication network (wireless LAN device 2) to one or a plurality of connection destinations. It is a structure...
US20070189510 Data collector  
Disclosed is a data collector that collects a first data string sent by a control unit to a network according to a predetermined format. The control unit has a first identification number, and the...
US20060140397 Method for transmitting messages between an emitter and at least on receiver and system for implementing said method  
This invention relates to a method for transmitting messages between an emitter and at least one receiver, comprising the following steps: encryption of the message (m) to be transmitted by means...
US20060269054 Extending the range of computational fields of intergers  
An extension of the serial/parallel Montgomery modular multiplication method with simultaneous reduction as previously implemented by the applicants, adapted innovatively to perform both in the...
US20080192928 Portable Electronic Storage Devices with Hardware Security Based on Advanced Encryption Standard  
Portable electronic storage devices with hardware based security are described. According to one exemplary embodiment of the present invention, a portable electronic storage device (PESD)...