Match Document Document Title
US20090210722 System for and method of locking and unlocking a secret using a fingerprint  
The present invention provides a way to lock a secret in a portable package. The package contains the key needed to unlock it. The key is dispersed throughout the encrypted data so that an...
US20100215174 RELIABLE ELLIPTIC CURVE CRYPTOGRAPHY COMPUTATION  
A method for reliable computation of point additions and point multiplications in an elliptic curve cryptography (ECC) system. Two asymmetric operations are performed: one of the operations is of...
US20100142701 EFFICIENT FULL OR PARTIAL DUPLICATE FORK DETECTION AND ARCHIVING  
A method to efficiently detect, store, modify, and recreate fully or partially duplicate file forks is described. During archive creation or modification, sets of fully or partially duplicate...
US20080253558 Polynomial-Based Key Distribution System and Method  
The present invention relates to a system (600) and method for sharing multiple session keys between low-power devices (701) and more advanced devices (702). A polynomial algorithm with a certain...
US20070217602 Method for fast quotient guess and congruencies manipulation  
A processor-executed computational method especially for use in cryptographic systems quickly determines a polynomial quotient under specific conditions. For a polynomial modulus f(x), a maximum...
US20150086008 METHOD FOR PRODUCING AN ELECTRONIC DEVICE WITH A DISABLED SENSITIVE MODE, AND METHOD FOR TRANSFORMING SUCH AN ELECTRONIC DEVICE TO RE-ACTIVATE ITS SENSITIVE MODE  
A method is intended for transforming a secure electronic device, associated to a first identifier and having a sensitive mode disabled after production, for a new sensitive use. This method...
US20090052658 DESCRAMBLING CIRCUIT, ERROR DETECTION CODE CALCULATING CIRCUIT AND SCRAMBLING CIRCUIT  
A descrambling circuit includes three or more scramble value generators, each configured to generate a new scramble value by a formula at a state of shifting number of times different from each...
US20090316901 SECRET COMMUNICATION METHOD AND SECRET COMMUNICATION DEVICE THEREOF  
A secret communication method and a communication device used in the method are provided for secret communication using communication path less frequently as a whole while avoiding a duplicative...
US20100014670 One-Way Hash Extension for Encrypted Communication  
Various apparatuses, methods and systems for encrypted communication are disclosed herein. For example, some embodiments provide an apparatus for encrypted communication, including a transmitter...
US20080232580 SECRET SHARING APPARATUS, METHOD, AND PROGRAM  
A secret sharing apparatus according to the present invention is based on a (k,n)-threshold scheme with a threshold of at least 4. The secret sharing apparatus generates a generator matrix (G) of...
US20090220070 Video Watermarking  
A method and system for watermarking video images including generating a watermark and embedding the generated watermark into video images by enforcing relationships between property values of...
US20100232599 Fault-resistant calculcations on elliptic curves  
Means for checking the correctness of a cryptographic operation on an elliptic curve E(Z/pZ), including fault-resistant computation of Q=kP on elliptic curve E(Z/pZ). Elliptic curve...
US20100014656 Cryptographic Method Comprising Secure Modular Exponentiation Against Hidden-Channel Attacks, Cryptoprocessor for Implementing the Method and Associated Chip Card  
A cryptographic method carries out a modular exponentiation of the type C=A mod N, where A is an operand, B1 is a first exponent, N is a modulus and C is a result. The method includes the steps of...
US20050141704 Generation of a watermark being unique to a receiver of a multicast transmission of multimedia  
A method, apparatus and system for distributing multimedia data in an efficient way using multicast transmission, whereby each receiver is provided with his own unique identifier in the form of a...
US20140233728 METHOD FOR SECURE SYMBOL COMPARISON  
A method for secure comparison of encrypted symbols. According to one embodiment, a user may encrypt two symbols, share the encrypted symbols with an untrusted third party that can compute...
US20080019505 Cooperative encoding of data by pluralities of parties  
Methods and apparatus include cooperatively encoding digital data between collaborating parties. By prior agreement, the parties take turns encoding portions of a given payload (e.g., document),...
US20120008768 MODE CONTROL ENGINE (MCE) FOR CONFIDENTIALITY AND OTHER MODES, CIRCUITS AND PROCESSES  
An electronic data processing module (600) includes a context storage (640), cryptographic cores (615.i) adapted for acceleration of respective different types of encryption and decryption, and a...
US20120201373 Design of a Good General-Purpose Hash Function with Limited Resources  
An apparatus comprising a plurality of stages that are coupled in series and configured to implement a hash function, wherein the stages comprise a plurality of XOR arrays and one or more...
US20110299678 SECURE MEANS FOR GENERATING A SPECIFIC KEY FROM UNRELATED PARAMETERS  
A technique and method for improving the security of the usage of a key in devices or systems with modes of operation that must be secured whereby the key has multiple fields with timing...
US20100329447 ENCRYPTION APPARATUS, DECRYPTION APPARATUS, KEY GENERATION APPARATUS, AND PROGRAM  
An encryption apparatus includes a plaintext embedding unit that embeds a message m as a coefficient of a three-variable plaintext polynomial m(x,y,t), an identification polynomial generating unit...
US20140270155 METHOD AND A DEVICE FOR FAULT-RESISTANT EXPONENTIATION IN CRYPTOGRAPHIC SYSTEMS  
A processor in a device performs fault-resistant exponentiation using an input x and a secret exponent d to obtain a result S, by using an a priori selected integer r and a chosen random element a...
US20100031055 EMBEDDED DEVICE HAVING COUNTERMEASURE FUNCTION AGAINST FAULT ATTACK  
A cryptographic processing device, comprising: a storage unit; initial setting unit for setting a value to be stored in the storage unit; Montgomery modular multiplication operation unit for...
US20090164803 Cipher Message Assist Instruction  
A method, system and program product for executing a cipher message assist instruction in a computer system by specifying, via the cipher message assist instruction, either a capability query...
US20130003963 Thwarting Unauthorized Content Copying Using Media Tracking Code  
Embodiments of techniques and systems for content protection and detection of protected media content are described. Visual tracking patterns may be displayed during rendering of protected media...
US20080310619 Process of Encryption and Operational Control of Tagged Data Elements  
A process of encrypting an object having an associated object tag includes generating a cryptographic key by binding an organization split, a maintenance split, a random split, and at least one...
US20120163585 MASKING ADDITION OPERATION DEVICE FOR PREVENTION OF SIDE CHANNEL ATTACK  
A masking addition operation apparatus for prevention of a side channel attack, includes a random value generation unit generating a first random value for a first input, second random value for a...
US20130188789 METHOD AND APPARATUS FOR GENERATING AN ADVANCED ENCRYPTION STANDARD (AES) KEY SCHEDULE  
An Advanced Encryption Standard (AES) key generation assist instruction is provided. The AES key generation assist instruction assists in generating round keys used to perform AES encryption and...
US20080181394 ENCRYPTION/DECRYPTION DEVICE FOR SECURE COMMUNICATIONS BETWEEN A PROTECTED NETWORK AND AN UNPROTECTED NETWORK AND ASSOCIATED METHODS  
The encryption/decryption device includes a plaintext unit, a ciphertext unit and a cryptographic unit connected therebetween. The plaintext unit may include a logic device such as a first...
US20070104322 Digital signature method based on braid groups conjugacy and verify method thereof  
The present invention discloses a digital signature scheme based on braid group conjugacy problem and a verifying method thereof, wherein the signatory S selects three braids xεLBm(l), x′εBn(l),...
US20090245506 FOURIER SERIES BASED AUTHENTICATION/DERIVATION  
For purposes of cryptographic authentication, verification and digital signature processes, a derivation function is provided. The derivation function is generated from a Fourier series, using a...
US20130308774 Method and System for Conducting High Speed, Symmetric Stream Cipher Encryption  
A method is provided for processing a digital information set having a plurality of information bytes. The method comprises receiving the information set, determining a set of initialization...
US20130028410 Method and System for Conducting High Speed, Symmetric Stream Cipher Encryption  
A method is provided for processing a digital information set having a plurality of information bytes. The method comprises receiving the information set, determining a set of initialization...
US20100054466 METHOD OF GENERATING ARBITRARY NUMBERS GIVEN A SEED  
The invention provides a method of generating arbitrary numbers given a seed, characterized by providing a challenge derived from the seed to a physical token, receiving an initial response from...
US20130064362 PRESERVATION OF ENCRYPTION  
An apparatus, method, system and computer-readable medium are provided for preserving an encryption of data when confronted by an attack, such as a side channel analysis (SCA) attack based on a...
US20100310065 SYSTEM AND APPARATUS FOR INTEGRATED VIDEO/IMAGE ENCODING/DECODING AND ENCRYPTION/DECRYPTION  
An encryption-enabled entropy coder for a multimedia codec is disclosed. The entropy coder implements a randomized Huffman coding scheme without storing multiple sets of Huffman tables in a ROM....
US20050105719 Personal information control and processing  
The present invention provides a personal information controlling system that limits use of personal information stored in a storage device. An example of a system comprises: controlling means for...
US20060008081 Modular-multiplication computing unit and information-processing unit  
Either a multiplicand A or 0 is selected, depending on the value of multiplier B supplied in a unit composed of q bits through the use of selectors, and the selected result is provided, and either...
US20060008083 Random number verification method and random number verification apparatus  
Disclosed is a random number verification method and apparatus capable of quickly detecting the fact that a random number generation device designed to generate substantially authentic random...
US20100281260 HASH FUNCTION BASED ON POLYMORPHIC CODE  
In the field of computer data security, a hash process which is typically keyless and embodied in a computing apparatus is highly secure in terms of being resistant to attack. The hash process...
US20080240423 SPEEDING UP GALOIS COUNTER MODE (GCM) COMPUTATIONS  
Methods and apparatus to speed up Galois Counter Mode (GCM) computations are described. In one embodiment, a carry-less multiplication instruction may be used to perform operations corresponding...
US20070172053 Method and system for microprocessor data security  
Embodiments of the invention relate generally to methods and systems for microprocessor data security, involving data encryption and decryption of stored data in, or in communication with, a...
US20100091982 DIFFERENTIAL POWER ANALYSIS - RESISTANT CRYPTOGRAPHIC PROCESSING  
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is...
US20090164435 METHODS AND SYSTEMS FOR QUANTUM SEARCH, COMPUTATION AND MEMORY  
A system for performing multi-dimensional quantum search, quantum computation, quantum memory, quantum storage, and quantum retrieval includes a structure and method for: enabling components and...
US20130163751 Method for Determining the Cofactor of an Elliptic Curve, Corresponding Electronic Component and Computer Program Product  
A method and apparatus are proposed for cryptographic computations implemented in an electronic component. The method includes determining the cofactor of an elliptic curve E defined over a finite...
US20140254793 SHANNON SECURITY DOUBLE SYMMETRICAL CRYPTOGRAM METHOD BY CODING INFORMATION FOR TELEMATIC AND ELECTRONIC TRANSMISSION  
An invention in the field of information society for making data and information inaccessible to unauthorized persons in order to protect the privacy of data and information during electronic...
US20100063986 COMPUTING DEVICE, METHOD, AND COMPUTER PROGRAM PRODUCT  
In a computing device that calculates a square of an element in a finite field, a vector representation of the element in the finite field is accepted. The vector representation includes a...
US20090279690 CRYPTOGRAPHIC SYSTEM INCLUDING A MIXED RADIX NUMBER GENERATOR WITH CHOSEN STATISTICAL ARTIFACTS  
A cryptographic system (1000) is provided. The cryptographic system includes a data stream receiving means (DSRM), a number generator (NG), a mixed radix accumulator (MRA) and an encryptor. The...
US20090067618 Random number generator  
Systems, methods, and other embodiments associated with random number generators are described. One system embodiment includes a random number generator logic that may produce an initial random...
US20090006869 Techniques for synchronizing and archive-versioning of encrypted files  
Techniques are presented for synchronizing and archive-versioning encrypted files. Blocks of encrypted data are managed and metadata is maintained for the blocks. The metadata identifies a maximum...
US20140029747 SYSTEM AND METHOD FOR TRANSCODING CONTENT  
A system is provided for use with secure content in a first format. The system includes a conditional access device, a transcoding device and a media processor. The conditional access device is...