Match

Document 
Document Title 

US20110249813 
METHOD FOR EMBEDDING SECRET MESSAGE INTO PNG IMAGE
A method for embedding a secret message into a PNG image comprises steps: converting a secret message into a plurality of secret codes; converting the secret codes into a plurality of secret... 

US20070019805 
System employing systematic robust error detection coding to protect system element against errors with unknown probability distributions
An error detection technique can be used with data encryption/decryption such as those implementing the Advanced Encryption Standard (AES) to protect against sidechannel attacks known as... 

US20090074179 
Information security device and elliptic curve operating device
Resistance against simple power analysis is maintained while a smaller table is used. An IC card 100 decrypts encrypted information using elliptic curve calculation for calculating a point k*C by... 

US20080148060 
Maintaining Code Integrity in a Central Software Development System
A central software development system comprises a code processor and a code authenticator. The code processor converts modified free source code received by the system to program code such as... 

US20100111296 
COLLISIONRESISTANT ELLIPTIC CURVE HASH FUNCTIONS
Elliptic curve hash functions are provided which do not require a preexisting hash function, such as that required by the MuHash. The elliptic curve hash functions can be built from scratch and... 

US20090238360 
EXPONENTIATION LADDER FOR CRYPTOGRAPHY
Method and apparatus for data security using exponentiation. This is suitable for public key cryptography authentication and other data security applications using a oneway function. A type of... 

US20050152539 
Method of protecting cryptographic operations from side channel attacks
Deterring side channel attacks on cryptographic computations using an exponent value e and a modulus value n to determine a result value may be accomplished by picking a first value, picking a... 

US20070133789 
COMPILING DEVICE AND METHOD FOR COMPILING
A compiling device for generating a second program sequence from a first program sequence comprises a recognizer for recognizing a first subarea and a second subarea of the first program sequence,... 

US20150110265 
PROTECTION OF THE EXECUTION OF AN ALGORITHM AGAINST SIDECHANNEL ATTACKS
A protection mechanism for the execution of an encryption algorithm is disclosed. In the mechanism the encryption algorithm has its execution preceded by an update of a counter stored in a... 

US20050125655 
Process for detecting defective component exchanges
Method of detecting an unauthorized exchange of components in the case of a technical system, where the control unit (1) sends an encoded message (3) to a component (2) to be checked, in a data... 

US20060147039 
Data encryption method cryptographic system and associated component
An encryption method in which a clear message (m) is formatted with a formatting function (p), and in which the result of the formatting step is exponentiated using a public key (N, e) in... 

US20090323928 
ITEM TRACING WITH SUPPLY CHAIN SECRECY USING RFID TAGS AND AN IDENTITYBASED ENCRYPTION SCHEME
A method for tracing an item may include encrypting item information using an identitybased encryption scheme with a batch number for an item as an encryption key and communicating the encrypted... 

US20070064929 
Method of protecting a cryptographic algorithm
The method of protecting an algorithm that can be decomposed into the form of initial polynomials (Pi) of at least two variables and of degree not less than two, comprises the steps of making... 

US20120027201 
ENCRYPTION APPARATUS, DECRYPTION APPARATUS, ENCRYPTION METHOD, DECRYPTION METHOD, SECURITY METHOD, PROGRAM, AND RECORDING MEDIUM
Security against CCA is improved without providing space for just improving the security against CCA in a ciphertext space. In encryption processing, a first ciphertext C1 is calculated from a... 

US20090296931 
Method for encryption and decryption of messages
A communication system that includes a sender computer and plurality of designated receiver computers coupled to the sender through a communication link. Each one of the receiver computers is... 

US20090282249 
PROCESS FOR ESTABLISHING A SECRET KEY
A method for establishing a secret key for a data transmission between communication partners in a network, in particular in a personal area network (PAN), or in a body area network (BAN), wherein... 

US20080063184 
Method of Performing a Modular Multiplication and Method of Performing a Euclidean Multiplication Using Numbers with 2N Bits
The invention relates to method of performing a modular multiplication using numbers with 2n bits. The method includes the steps of breaking the numbers (A, B) down into a 2n base or a U base, U... 

US20070274525 
Encrypted communication system, communication status management server, encrypted communication method, and communication status management method
An encrypted communication system is provided, in which an encryption key for use in encrypted communication and settings information for the encrypted communication are distributed to each of a... 

US20080130871 
Permute Unit and Method to Operate a Permute Unit
A permute unit is described comprising a permute logic and a crossbar working in cycles defined by clocking signals and generating one valid output vector per cycle by treating two parallel input... 

US20050243998 
Apparatus and method for consistency checking public key cryptography computations
A cryptographic system comprising: 1) a first Montgomerybased cryptographic engine that receives a first operand and a second operand and generates a first result and 2) a second Montgomerybased... 

US20060109981 
Small hardware implementation of the subbyte function of rijndael
A small hardware implementation is provided for the Advanced Encryption Standard SubByte function that implements the affine transform and inverse transform in a single AffineAll transform using... 

US20070058800 
Transition between masked representations of a value during cryptographic calculations
In a method for the transition from a first masked representation of a value to be kept secret to a second masked representation of the value, according to a first aspect of the invention at least... 

US20050135604 
Technique for generating output states in a security algorithm
An architecture to perform a hash algorithm. Embodiments of the invention relate to the use of processor architecture logic to implement an addition operation of initial state information to... 

US20060088156 
Cfm mode system
A method for producing at least one ciphertext block from at least one plaintext block using a block cipher E and a key K, the method including receiving n plaintext blocks, wherein n is an... 

US20080165965 
METHOD OF TWO STRINGS PRIVATE KEY (SYMMETRIC) ENCRYPTION AND DECRYPTION ALGORITHM
Two strings encryption algorithm where a long and a short strings are used. The byte values of the short string points to a location of the long string and the plaintext is aligned with the long... 

US20100228980 
Method and Arrangement for Providing a Wireless Mesh Network
A method and an arrangement are provided wherein a newly added mesh node does not require a link to the AAA server for the purpose of authentication. Authentication is carried out using a node... 

US20100013595 
Method for controlling the reuse of prefilled reagent dispensers and other consumables
This disclosure provides methods and systems by which a device could detect if it has been loaded with a consumable that was not authorized by the manufacturer of the device even if the gray... 

US20090103717 
System and method for implementing elliptic curve scalar multiplication in cryptography
A system and method for implementing the Elliptic Curve scalar multiplication method in cryptography, where the Double Base Number System is expressed in decreasing order of exponents and further... 

US20080095357 
Cryptographic Computation Method, Cryptographic System, and Computer Program
A system and method for achieving secure and fast computation in hyperelliptic cryptography is realized. Fast scalar multiplication is achieve by executing computing operations including halving... 

US20090136024 
Sharing a secret using polynomials
A method and system for distributing n shares of a secret to n computing systems, and a method and system for reconstructing the secret from k shares of the secret. In one embodiment, the method... 

US20080107259 
METHOD AND A CIRCUIT FOR SHA OPERATION WITH POWER SAVED
A Secure Hash Algorithm (SHA) operation circuit includes plural storages for storing the variables of the SHA calculation, a permutation section for permuting the output signals of the storages,... 

US20050135606 
Method and apparatus for verifiable generation of public keys
The invention provides a method of verifiable generation of public keys. According to the method, a selfsigned signature is first generated and then used as input to the generation of a pair of... 

US20100146028 
METHOD AND APPARATUS FOR MODULUS REDUCTION
A modulo reduction is performed on a value a represented as an ordered sequence of computer readable words. The lowest order words are eliminated by substituting an equivalent value represented by... 

US20100091981 
Steganalysis of Suspect Media
Techniques described herein are generally related to steganalysis of suspect media. Steganalysis techniques may include receiving instances of suspect media as input for steganalytic processing. A... 

US20090041230 
Mobile Client Device Driven Data Backup
Tasks associated with backing up the data of a mobile client device are performed predominantly by the mobile client device. A backup server functions as a server with limited functionality that... 

US20140003600 
Cryptographic System of SymmetricKey Encryption using Large Permutation Vector Keys
A method for use in encrypting data using a computer. The method comprises receiving data to be encrypted, defining a set of byte codes comprising user byte codes, meta byte codes, and dead byte... 

US20150215113 
HASH VALUE CALCULATION DEVICE, HASH VALUE CALCULATION METHOD, AND HASH VALUE CALCULATION PROGRAM
The object is to constitute a hash function by removing a feedforward arithmetic operation. A hash value calculation device, for each integer i of i=1, . . . , L in an ascending order, calculates... 

US20080101595 
Error correction system and method for mobile terminal
An error correction system and method for a mobile terminal is provided that are capable of correcting transmission packet errors. The error correction method for a mobile communication system... 

US20080063187 
HASH VALUE GENERATION DEVICE, PROGRAM, AND HASH VALUE GENERATION METHOD
A hash value generation device has a control part (120) that divides an inputted message into N message blocks of a predetermined data length (N being a natural number), repeats transformation... 

US20140355754 
Partial CipherText Updates Using VariableLength Segments Delineated by Pattern Matching and Encrypted by FixedLength Blocks
A reencryptor compares hashed digests of updated segments and original segments to located changed segments that must be reencrypted. A new initialization vector is input to a block cipher... 

US20100208884 
Method and device for hashing onto points of an elliptic curve
Hashing onto elements of a group, in particular onto points of an elliptic curve. An input message is run through a “regular” hashing algorithm, such as e.g. SHA1 and MD5, and used as a scalar in... 

US20120213359 
METHOD AND APPARATUS FOR SECURE ITERATIVE PROCESSING
Disclosed embodiments include methods and apparatuses for secure iterative processing of encrypted signals based on implementing a secure iterative processing protocol that avoids cipher blowup,... 

US20050163312 
Cryptographic method protected against covert channel type attacks
The invention relates to a cryptographic method secured against a covert channel attack. According to the invention, in order to carry out a selected block of instructions as a function of an... 

US20070147603 
Copyright protection system, modular exponentiation operation apparatus, and modular exponentiation operation method
A copyright protection system is provided that keeps manufacturing costs down regardless of the total number of playback apparatuses belonging to the system. In this system, a device key... 

US20100183146 
PARALLELIZABLE INTEGRITYAWARE ENCRYPTION TECHNIQUE
The present disclosure provides a parallelizable integrityaware encryption technique. In at least one embodiment of the present disclosure, a parallelizable integrityaware encryption method... 

US20100014657 
PRIVACY PRESERVING SOCIAL NETWORK ANALYSIS
A method and a system for privacypreserving SNA. A plurality of vertices of a first subgraph of a graph is encrypted with a first key of a commutatively encryption scheme. A plurality of vertices... 

US20080240425 
Data DeIdentification By Obfuscation
Medical or other data is deidentified by obfuscation. Located instances are replaced. By replacing with values in a same format and level of generality, multiple possible identifications—the... 

US20080049931 
Cryptographic methods including montgomery power ladder algorithms
A cryptographic method of countering differential fault analysis (DFA) using elliptic curve cryptography (ECC) fast Montgomery power ladder algorithm (MPLA) is provided. The cryptographic method... 

US20100146029 
METHOD AND APPARATUS FOR MODULAR OPERATION
The modular operation apparatus of the present invention that enables to improve the tamper resistance to the side channel attacks includes an operator that carries out a Montgomery multiplication... 

US20080219441 
Arrangement Comprising an Integrated Circuit
An integrated circuit (1) is provided with function modules (2) which comprise a central processing unit (4) for treating data and executing a program and a cache memory (5). Until now, it was... 