Match Document Document Title
US20110249813 METHOD FOR EMBEDDING SECRET MESSAGE INTO PNG IMAGE  
A method for embedding a secret message into a PNG image comprises steps: converting a secret message into a plurality of secret codes; converting the secret codes into a plurality of secret...
US20070019805 System employing systematic robust error detection coding to protect system element against errors with unknown probability distributions  
An error detection technique can be used with data encryption/decryption such as those implementing the Advanced Encryption Standard (AES) to protect against side-channel attacks known as...
US20090074179 Information security device and elliptic curve operating device  
Resistance against simple power analysis is maintained while a smaller table is used. An IC card 100 decrypts encrypted information using elliptic curve calculation for calculating a point k*C by...
US20080148060 Maintaining Code Integrity in a Central Software Development System  
A central software development system comprises a code processor and a code authenticator. The code processor converts modified free source code received by the system to program code such as...
US20100111296 COLLISION-RESISTANT ELLIPTIC CURVE HASH FUNCTIONS  
Elliptic curve hash functions are provided which do not require a pre-existing hash function, such as that required by the MuHash. The elliptic curve hash functions can be built from scratch and...
US20090238360 EXPONENTIATION LADDER FOR CRYPTOGRAPHY  
Method and apparatus for data security using exponentiation. This is suitable for public key cryptography authentication and other data security applications using a one-way function. A type of...
US20050152539 Method of protecting cryptographic operations from side channel attacks  
Deterring side channel attacks on cryptographic computations using an exponent value e and a modulus value n to determine a result value may be accomplished by picking a first value, picking a...
US20070133789 COMPILING DEVICE AND METHOD FOR COMPILING  
A compiling device for generating a second program sequence from a first program sequence comprises a recognizer for recognizing a first subarea and a second subarea of the first program sequence,...
US20150110265 PROTECTION OF THE EXECUTION OF AN ALGORITHM AGAINST SIDE-CHANNEL ATTACKS  
A protection mechanism for the execution of an encryption algorithm is disclosed. In the mechanism the encryption algorithm has its execution preceded by an update of a counter stored in a...
US20050125655 Process for detecting defective component exchanges  
Method of detecting an unauthorized exchange of components in the case of a technical system, where the control unit (1) sends an encoded message (3) to a component (2) to be checked, in a data...
US20060147039 Data encryption method cryptographic system and associated component  
An encryption method in which a clear message (m) is formatted with a formatting function (p), and in which the result of the formatting step is exponentiated using a public key (N, e) in...
US20090323928 ITEM TRACING WITH SUPPLY CHAIN SECRECY USING RFID TAGS AND AN IDENTITY-BASED ENCRYPTION SCHEME  
A method for tracing an item may include encrypting item information using an identity-based encryption scheme with a batch number for an item as an encryption key and communicating the encrypted...
US20070064929 Method of protecting a cryptographic algorithm  
The method of protecting an algorithm that can be decomposed into the form of initial polynomials (Pi) of at least two variables and of degree not less than two, comprises the steps of making...
US20120027201 ENCRYPTION APPARATUS, DECRYPTION APPARATUS, ENCRYPTION METHOD, DECRYPTION METHOD, SECURITY METHOD, PROGRAM, AND RECORDING MEDIUM  
Security against CCA is improved without providing space for just improving the security against CCA in a ciphertext space. In encryption processing, a first ciphertext C1 is calculated from a...
US20090296931 Method for encryption and decryption of messages  
A communication system that includes a sender computer and plurality of designated receiver computers coupled to the sender through a communication link. Each one of the receiver computers is...
US20090282249 PROCESS FOR ESTABLISHING A SECRET KEY  
A method for establishing a secret key for a data transmission between communication partners in a network, in particular in a personal area network (PAN), or in a body area network (BAN), wherein...
US20080063184 Method of Performing a Modular Multiplication and Method of Performing a Euclidean Multiplication Using Numbers with 2N Bits  
The invention relates to method of performing a modular multiplication using numbers with 2n bits. The method includes the steps of breaking the numbers (A, B) down into a 2n base or a U base, U...
US20070274525 Encrypted communication system, communication status management server, encrypted communication method, and communication status management method  
An encrypted communication system is provided, in which an encryption key for use in encrypted communication and settings information for the encrypted communication are distributed to each of a...
US20080130871 Permute Unit and Method to Operate a Permute Unit  
A permute unit is described comprising a permute logic and a crossbar working in cycles defined by clocking signals and generating one valid output vector per cycle by treating two parallel input...
US20050243998 Apparatus and method for consistency checking public key cryptography computations  
A cryptographic system comprising: 1) a first Montgomery-based cryptographic engine that receives a first operand and a second operand and generates a first result and 2) a second Montgomery-based...
US20060109981 Small hardware implementation of the subbyte function of rijndael  
A small hardware implementation is provided for the Advanced Encryption Standard SubByte function that implements the affine transform and inverse transform in a single Affine-All transform using...
US20070058800 Transition between masked representations of a value during cryptographic calculations  
In a method for the transition from a first masked representation of a value to be kept secret to a second masked representation of the value, according to a first aspect of the invention at least...
US20050135604 Technique for generating output states in a security algorithm  
An architecture to perform a hash algorithm. Embodiments of the invention relate to the use of processor architecture logic to implement an addition operation of initial state information to...
US20060088156 Cfm mode system  
A method for producing at least one ciphertext block from at least one plaintext block using a block cipher E and a key K, the method including receiving n plaintext blocks, wherein n is an...
US20080165965 METHOD OF TWO STRINGS PRIVATE KEY (SYMMETRIC) ENCRYPTION AND DECRYPTION ALGORITHM  
Two strings encryption algorithm where a long and a short strings are used. The byte values of the short string points to a location of the long string and the plaintext is aligned with the long...
US20100228980 Method and Arrangement for Providing a Wireless Mesh Network  
A method and an arrangement are provided wherein a newly added mesh node does not require a link to the AAA server for the purpose of authentication. Authentication is carried out using a node...
US20100013595 Method for controlling the re-use of prefilled reagent dispensers and other consumables  
This disclosure provides methods and systems by which a device could detect if it has been loaded with a consumable that was not authorized by the manufacturer of the device even if the gray...
US20090103717 System and method for implementing elliptic curve scalar multiplication in cryptography  
A system and method for implementing the Elliptic Curve scalar multiplication method in cryptography, where the Double Base Number System is expressed in decreasing order of exponents and further...
US20080095357 Cryptographic Computation Method, Cryptographic System, and Computer Program  
A system and method for achieving secure and fast computation in hyperelliptic cryptography is realized. Fast scalar multiplication is achieve by executing computing operations including halving...
US20090136024 Sharing a secret using polynomials  
A method and system for distributing n shares of a secret to n computing systems, and a method and system for reconstructing the secret from k shares of the secret. In one embodiment, the method...
US20080107259 METHOD AND A CIRCUIT FOR SHA OPERATION WITH POWER SAVED  
A Secure Hash Algorithm (SHA) operation circuit includes plural storages for storing the variables of the SHA calculation, a permutation section for permuting the output signals of the storages,...
US20050135606 Method and apparatus for verifiable generation of public keys  
The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of...
US20100146028 METHOD AND APPARATUS FOR MODULUS REDUCTION  
A modulo reduction is performed on a value a represented as an ordered sequence of computer readable words. The lowest order words are eliminated by substituting an equivalent value represented by...
US20100091981 Steganalysis of Suspect Media  
Techniques described herein are generally related to steganalysis of suspect media. Steganalysis techniques may include receiving instances of suspect media as input for steganalytic processing. A...
US20090041230 Mobile Client Device Driven Data Backup  
Tasks associated with backing up the data of a mobile client device are performed predominantly by the mobile client device. A backup server functions as a server with limited functionality that...
US20140003600 Cryptographic System of Symmetric-Key Encryption using Large Permutation Vector Keys  
A method for use in encrypting data using a computer. The method comprises receiving data to be encrypted, defining a set of byte codes comprising user byte codes, meta byte codes, and dead byte...
US20150215113 HASH VALUE CALCULATION DEVICE, HASH VALUE CALCULATION METHOD, AND HASH VALUE CALCULATION PROGRAM  
The object is to constitute a hash function by removing a feed-forward arithmetic operation. A hash value calculation device, for each integer i of i=1, . . . , L in an ascending order, calculates...
US20080101595 Error correction system and method for mobile terminal  
An error correction system and method for a mobile terminal is provided that are capable of correcting transmission packet errors. The error correction method for a mobile communication system...
US20080063187 HASH VALUE GENERATION DEVICE, PROGRAM, AND HASH VALUE GENERATION METHOD  
A hash value generation device has a control part (120) that divides an inputted message into N message blocks of a predetermined data length (N being a natural number), repeats transformation...
US20140355754 Partial CipherText Updates Using Variable-Length Segments Delineated by Pattern Matching and Encrypted by Fixed-Length Blocks  
A re-encryptor compares hashed digests of updated segments and original segments to located changed segments that must be re-encrypted. A new initialization vector is input to a block cipher...
US20100208884 Method and device for hashing onto points of an elliptic curve  
Hashing onto elements of a group, in particular onto points of an elliptic curve. An input message is run through a “regular” hashing algorithm, such as e.g. SHA-1 and MD5, and used as a scalar in...
US20120213359 METHOD AND APPARATUS FOR SECURE ITERATIVE PROCESSING  
Disclosed embodiments include methods and apparatuses for secure iterative processing of encrypted signals based on implementing a secure iterative processing protocol that avoids cipher blowup,...
US20050163312 Cryptographic method protected against covert channel type attacks  
The invention relates to a cryptographic method secured against a covert channel attack. According to the invention, in order to carry out a selected block of instructions as a function of an...
US20070147603 Copyright protection system, modular exponentiation operation apparatus, and modular exponentiation operation method  
A copyright protection system is provided that keeps manufacturing costs down regardless of the total number of playback apparatuses belonging to the system. In this system, a device key...
US20100183146 PARALLELIZABLE INTEGRITY-AWARE ENCRYPTION TECHNIQUE  
The present disclosure provides a parallelizable integrity-aware encryption technique. In at least one embodiment of the present disclosure, a parallelizable integrity-aware encryption method...
US20100014657 PRIVACY PRESERVING SOCIAL NETWORK ANALYSIS  
A method and a system for privacy-preserving SNA. A plurality of vertices of a first subgraph of a graph is encrypted with a first key of a commutatively encryption scheme. A plurality of vertices...
US20080240425 Data De-Identification By Obfuscation  
Medical or other data is de-identified by obfuscation. Located instances are replaced. By replacing with values in a same format and level of generality, multiple possible identifications—the...
US20080049931 Cryptographic methods including montgomery power ladder algorithms  
A cryptographic method of countering differential fault analysis (DFA) using elliptic curve cryptography (ECC) fast Montgomery power ladder algorithm (MPLA) is provided. The cryptographic method...
US20100146029 METHOD AND APPARATUS FOR MODULAR OPERATION  
The modular operation apparatus of the present invention that enables to improve the tamper resistance to the side channel attacks includes an operator that carries out a Montgomery multiplication...
US20080219441 Arrangement Comprising an Integrated Circuit  
An integrated circuit (1) is provided with function modules (2) which comprise a central processing unit (4) for treating data and executing a program and a cache memory (5). Until now, it was...