Match

Document 
Document Title 

US20120237021 
MULTIDIMENSIONAL MONTGOMERY LADDERS FOR ELLIPTIC CURVES
An algorithm is provided having a matrix phase and point addition phase that permits computation of the combination of more than two point multiples. The algorithm has particular utility in... 

US20140040617 
METHOD FOR THE GENERATION OF A CODE, AND METHOD AND SYSTEM FOR THE AUTHORIZATION OF AN OPERATION
The present invention relates to a method for generating a code and a method comprising the authorization of an operation carried out by a client on a first server. A second server generating an... 

US20140205085 
PREVENTING PATTERN RECOGNITION IN ELECTRONIC CODE BOOK ENCRYPTION
In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book... 

US20110099377 
COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY
The present invention relates to the field of securing electronic transactions and more specifically to methods to indicate and verify the approval of the risk level of a transaction and to... 

US20120275592 
DECOUPLING RIGHTS IN A DIGITAL CONTENT UNIT FROM DOWNLOAD
Systems and methods for enabling a user to obtain rights in a legitimate copy of a digital content unit without downloading the copy from a digital content store are provided. The systems and... 

US20140098951 
METHOD FOR ELLIPTIC CURVE CRYPTOGRAPHY WITH COUNTERMEASURES AGAINST SIMPLE POWER ANALYSIS AND FAULT INJECTION ANALYSIS AND SYSTEM THEREOF
There are provided a method for elliptic curve cryptography with countermeasures against simple power analysis and fault injection analysis, and a system thereof. According to an aspect, there is... 

US20100296649 
CRYPTOGRAPHIC PROCESSING OF CONTENT
A system for cryptographic processing of content comprises an input for receiving the content. A plurality of lookup tables represents a whitebox implementation of a combined cryptographic and... 

US20110013767 
MASKING METHOD OF DEFENDING DIFFERENTIAL POWER ANALYSIS ATTACK IN SEED ENCRYPTION ALGORITHM
A plurality of Sboxes is masked by one masking inverse table. Therefore, the computation cost and the use amount of the RAM necessary for masking at the time of a masking operation for defending... 

US20150023495 
CHANGETOLERANT METHOD FOR GENERATING IDENTIFIER FOR COLLECTION OF ASSETS IN COMPUTING ENVIRONMENT USING ERRORCORRECTION CODE SCHEME
A secure and changetolerant method for obtaining an identifier for a collection of assets associated with a computing environment. Each asset has an asset parameter and the computing environment... 

US20120011502 
MANAGING UNIQUE ELECTRONIC IDENTIFICATION FOR KERNEL EXTENSIONS IN ISOLATED VIRTUAL SPACE
Some embodiments of the inventive subject matter are directed to detecting a file that a first instance of an operating system is configured to load where the file is configured to extend... 

US20110064225 
SECURITY COUNTERMEASURE FOR POWER ANALYSIS ATTACKS
A countermeasure for differential power analysis attacks on computing devices. The countermeasure includes the definition of a set of split mask values. The split mask values are applied to a key... 

US20110170684 
DETERMINATION OF PAIRINGS ON A CURVE USING AGGREGATED INVERSIONS
One or more techniques and/or systems are disclosed that provide for determining mathematical pairings for a curve for use in cryptography. A plurality of inversions used for determining the... 

US20130322616 
CRYPTIC NOTES AND RELATED APPARATUS AND METHODS
A computerimplemented method is described. A message is received from a user via a user interface of a computer device. The message includes at least first and second portions. A virtual cryptic... 

US20120039464 
Emergency callbased security algorithm negotiation method and apparatus
An emergency callbased security algorithm negotiation method and apparatus are disclosed. The method comprises the following steps: after receiving an attachment request from a User Equipment... 

US20110019815 
METHOD OF AUTHENTICATION USING A DECODING OF AN ERROR CORRECTING CODE ON THE BASIS OF A PUBLIC MATRIX
The invention relates to a cryptographic method of authentication using a decoding of an error correcting code on the basis of a public matrix, in which the public matrix is a quasicyclic matrix.... 

US20120069992 
Product Authentication Using EndToEnd Cryptographic Scheme
A system is provided for insidetooutside or outsidetoinside cryptographic coding that facilitates product authentication along a distribution channel. An association of authenticated, secured... 

US20120294439 
METHOD FOR IMPLEMENTING SYMMETRIC KEY ENCRYPTION ALGORITHM AGAINST POWER ANALYSIS ATTACKS
Disclosed is a method for implementing a symmetric key encryption algorithm against power analysis attacks, including: generating and storing an affine transform table; generating and storing a... 

US20140301547 
Assessing Cryptographic Entropy
Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A... 

US20130136255 
ASSESSING CRYPTOGRAPHIC ENTROPY
Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A... 

US20120039463 
Fast Evaluation Of Many Polynomials With Small Coefficients On The Same Point
In one exemplary embodiment of the invention, a method for evaluating at point r one or more polynomials p1(x), . . . , pl(x) of maximum degree up to n−1, where the polynomial pi(x) has a degree... 

US20130202104 
XZELLIPTIC CURVE CRYPTOGRAPHY SYSTEM AND METHOD
The XZelliptic curve cryptography system and method provides a computerized method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the... 

US20120039462 
RSA SIGNATURE METHOD AND APPARATUS
A Revest, Shamir and Adleman (RSA) signature method includes: creating an initial hidden value using a private key and an RSA modular; converting a message to a hidden message by blinding the... 

US20150092940 
Method for Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields Countermeasure for SimpleSide Channel Attacks and CSafeFault Attacks for RighttoLeft Algorithms
The present invention describes a method which improves the safety aspects of the previously published atomic blocks for the righttoleft case. This method builds new sets of atomic blocks... 

US20150010142 
METHOD FOR AUTHENTICATED ENCRYPTION AND DECRYPTION
In this invention, a new authenticated encryption and decryption technique has been proposed. In general, conventional encryption modes like (CTR, CBC, and CFB etc.) cannot provide integrity... 

US20140340112 
METHODS AND SYSTEMS FOR HARDWARE PIRACY PREVENTION
Provided are methods, systems, and devices for preventing hardware piracy. 

US20130114805 
ENCRYPTION SYSTEM USING DISCRETE CHAOS FUNCTION
Provided is an encryption system, which includes: an encryption round calculation unit for encrypting a plain text; and a substitution unit provided at the encryption round calculation unit and... 

US20140314230 
CRYPTOGRAPHY ON AN ELLIPTICAL CURVE
A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X); and from polynomials X1(t), X2(t), X3(t) and U(t) satisfying:... 

US20120082307 
CRYPTOGRAPHY ON A ELLIPTICAL CURVE
A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X); and from polynomials X1(t), X2(t), X3(t) and U(t) satisfying:... 

US20110216900 
METHODS OF ENCRYPTION AND DECRYPTION AND ENCRYPTION SYSTEMS USING THE SAME
Provided is a decryption method of an encryption algorithm. In the decryption method, a secret key can be received. A plurality of Montgomery multiplications can be repeated on a cipher text until... 

US20140334621 
Method for Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields Countermeasure for SimpleSide Channel Attacks and CSafeFault Attacks for LefttoRight Algorithms
The present invention describes a method which improves the safety aspects of the previously published atomic blocks. This method builds new sets of atomic blocks designed to protect against both... 

US20140314229 
CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE
A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X) and from polynomials satisfying: −f(X1(t)).f(X2(t))=U(t)2 in the finite body Fq,... 

US20120093309 
CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE
A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X) and from polynomials satisfying: −f(X1(t)).f(X2(t))=U(t)2 in the finite body Fq,... 

US20150215117 
WHITE BOX ENCRYPTION APPARATUS AND METHOD
Disclosed are a white box encryption apparatus and method. The white box encryption method includes performing an encryption operation using a plurality of white box encryption tables for each of... 

US20140177824 
SYSTEM AND METHOD FOR SECURING SCALAR MULTIPLICATION AGAINST DIFFERENTIAL POWER ATTACKS
The system and method for securing scalar multiplication against differential power attacks (DPAs) delays required point additions in elliptic curve cryptosystem scalar multiplication. A buffer is... 

US20120114116 
APPARATUS AND METHOD FOR STORING ELECTRONIC RECEIPTS ON A UNIFIED CARD
A Unified Card system allows customers to store receipts on a Unified Card when making purchases from different retailer merchants. The customer purchases goods or services and the receipt is... 

US20120027200 
FLEXIBLE INTERFACE FOR SECUREINPUT OF PIN CODE
The present invention concerns a system (10) and a process for authenticating a PIN code of a user in an interactive information system in order to run an application. It comprises input means... 

US20140023191 
Mass Serialization Analytics
A method of determining whether a mass serialization engine is cryptographically secure is provided herein. The method includes performing (202) a specified number of mass serializations to... 

US20130294599 
PLUGGABLE CRYPTOGRAPHY
Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher... 

US20140369492 
METHOD TO CALCULATE SQUARE ROOTS FOR ELLIPTIC CURVE CRYPTOGRAPHY
A method is presented to compute square roots of finite field elements from the prime finite field of characteristic p over which points lie on a defined elliptic curve. Specifically, while... 

US20140198911 
SHARING A SECRET VIA LINEAR INTERPOLATION
A method and system distributes shares of a secret among cooperating entities using linear interpolation. In one embodiment, a linear equation is formed using the secret and random elements. The... 

US20150188713 
METHOD TO REDUCE THE LATENCY OF ECDSA SIGNATURE GENERATION USING PRECOMPUTATION
In order to reduce latency of elliptical curve digital signature generation a portion of the digital signature is precalculated before receipt of the message hash using an unmodified ECDSA... 

US20130182836 
SECRET SHARING SYSTEM, SECRET SHARING APPARATUS, SECRET SHARING METHOD, SECRET SORTING METHOD, SECRET SHARING PROGRAM
A secret sharing system according to the present invention includes N secret sharing apparatuses. The secret sharing system according to the present invention includes fragment replacement means... 

US20110182421 
ENCIPHERMENT OF DIGITAL SEQUENCES BY REVERSIBLE TRANSPOSITION METHODS
Methods for transposing elements of a sequence according to a rule, wherein the rule is derived from pseudonoise or pseudonoise like binary and nonbinary sequences are disclosed. Sequences of... 

US20130108038 
SYSTEM AND METHOD FOR A COLLATZ BASED HASH FUNCTION
Disclosed herein are systems, methods, and nontransitory computerreadable storage media for generating a hash based on the Collatz conjecture. The Collatz conjecture is based on a set of... 

US20100306541 
HASH FUNCTION USING A CARD SHUFFLING PROCESS
In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure. The process is based on the type of... 

US20120269340 
HIERARCHICAL ENCRYPTION/DECRYPTION DEVICE AND METHOD THEREOF
A hierarchical encryption device for decrypting a ciphertext and outputting a plaintext is disclosed in the invention, wherein the ciphertext comprises an encrypted block and a plurality of... 

US20120008767 
SYSTEM FOR ENCRYPTING AND DECRYPTING A PLAINTEXT MESSAGE WITH AUTHENTICATION
The described system and method provide for an encryption and authentication technique that achieves enhanced integrity verification through assured errorpropagation using a multistage sequence... 

US20140177826 
TECHNIQUES TO STRENGTHEN ONETIME PAD ENCRYPTION
Apparati, methods, and computerreadable media for strengthening a onetime pad encryption system. A method embodiment of the present invention comprises the steps of encrypting plaintext (1) with... 

US20110051928 
TECHNIQUES TO STRENGTHEN ONETIME PAD ENCRYPTION
Apparati, methods, and computerreadable media for strengthening a onetime pad encryption system. A method embodiment of the present invention comprises the steps of encrypting plaintext (1) with... 

US20150086007 
COMPACT, LOW POWER ADVANCED ENCRYPTION STANDARD CIRCUIT
Embodiments of an invention for a compact, low power Advanced Encryption Standard circuit are disclosed. In one embodiment, an apparatus includes an encryption unit having a substitution box and... 