Match Document Document Title
US20120237021 MULTI-DIMENSIONAL MONTGOMERY LADDERS FOR ELLIPTIC CURVES  
An algorithm is provided having a matrix phase and point addition phase that permits computation of the combination of more than two point multiples. The algorithm has particular utility in...
US20140040617 METHOD FOR THE GENERATION OF A CODE, AND METHOD AND SYSTEM FOR THE AUTHORIZATION OF AN OPERATION  
The present invention relates to a method for generating a code and a method comprising the authorization of an operation carried out by a client on a first server. A second server generating an...
US20140205085 PREVENTING PATTERN RECOGNITION IN ELECTRONIC CODE BOOK ENCRYPTION  
In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book...
US20110099377 COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY  
The present invention relates to the field of securing electronic transactions and more specifically to methods to indicate and verify the approval of the risk level of a transaction and to...
US20120275592 DECOUPLING RIGHTS IN A DIGITAL CONTENT UNIT FROM DOWNLOAD  
Systems and methods for enabling a user to obtain rights in a legitimate copy of a digital content unit without downloading the copy from a digital content store are provided. The systems and...
US20140098951 METHOD FOR ELLIPTIC CURVE CRYPTOGRAPHY WITH COUNTERMEASURES AGAINST SIMPLE POWER ANALYSIS AND FAULT INJECTION ANALYSIS AND SYSTEM THEREOF  
There are provided a method for elliptic curve cryptography with countermeasures against simple power analysis and fault injection analysis, and a system thereof. According to an aspect, there is...
US20100296649 CRYPTOGRAPHIC PROCESSING OF CONTENT  
A system for cryptographic processing of content comprises an input for receiving the content. A plurality of look-up tables represents a white-box implementation of a combined cryptographic and...
US20110013767 MASKING METHOD OF DEFENDING DIFFERENTIAL POWER ANALYSIS ATTACK IN SEED ENCRYPTION ALGORITHM  
A plurality of S-boxes is masked by one masking inverse table. Therefore, the computation cost and the use amount of the RAM necessary for masking at the time of a masking operation for defending...
US20150023495 CHANGE-TOLERANT METHOD FOR GENERATING IDENTIFIER FOR COLLECTION OF ASSETS IN COMPUTING ENVIRONMENT USING ERROR-CORRECTION CODE SCHEME  
A secure and change-tolerant method for obtaining an identifier for a collection of assets associated with a computing environment. Each asset has an asset parameter and the computing environment...
US20120011502 MANAGING UNIQUE ELECTRONIC IDENTIFICATION FOR KERNEL EXTENSIONS IN ISOLATED VIRTUAL SPACE  
Some embodiments of the inventive subject matter are directed to detecting a file that a first instance of an operating system is configured to load where the file is configured to extend...
US20110064225 SECURITY COUNTERMEASURE FOR POWER ANALYSIS ATTACKS  
A countermeasure for differential power analysis attacks on computing devices. The countermeasure includes the definition of a set of split mask values. The split mask values are applied to a key...
US20110170684 DETERMINATION OF PAIRINGS ON A CURVE USING AGGREGATED INVERSIONS  
One or more techniques and/or systems are disclosed that provide for determining mathematical pairings for a curve for use in cryptography. A plurality of inversions used for determining the...
US20130322616 CRYPTIC NOTES AND RELATED APPARATUS AND METHODS  
A computer-implemented method is described. A message is received from a user via a user interface of a computer device. The message includes at least first and second portions. A virtual cryptic...
US20120039464 Emergency call-based security algorithm negotiation method and apparatus  
An emergency call-based security algorithm negotiation method and apparatus are disclosed. The method comprises the following steps: after receiving an attachment request from a User Equipment...
US20110019815 METHOD OF AUTHENTICATION USING A DECODING OF AN ERROR CORRECTING CODE ON THE BASIS OF A PUBLIC MATRIX  
The invention relates to a cryptographic method of authentication using a decoding of an error correcting code on the basis of a public matrix, in which the public matrix is a quasi-cyclic matrix....
US20120069992 Product Authentication Using End-To-End Cryptographic Scheme  
A system is provided for inside-to-outside or outside-to-inside cryptographic coding that facilitates product authentication along a distribution channel. An association of authenticated, secured...
US20120294439 METHOD FOR IMPLEMENTING SYMMETRIC KEY ENCRYPTION ALGORITHM AGAINST POWER ANALYSIS ATTACKS  
Disclosed is a method for implementing a symmetric key encryption algorithm against power analysis attacks, including: generating and storing an affine transform table; generating and storing a...
US20140301547 Assessing Cryptographic Entropy  
Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A...
US20130136255 ASSESSING CRYPTOGRAPHIC ENTROPY  
Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A...
US20120039463 Fast Evaluation Of Many Polynomials With Small Coefficients On The Same Point  
In one exemplary embodiment of the invention, a method for evaluating at point r one or more polynomials p1(x), . . . , pl(x) of maximum degree up to n−1, where the polynomial pi(x) has a degree...
US20130202104 XZ-ELLIPTIC CURVE CRYPTOGRAPHY SYSTEM AND METHOD  
The XZ-elliptic curve cryptography system and method provides a computerized method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the...
US20120039462 RSA SIGNATURE METHOD AND APPARATUS  
A Revest, Shamir and Adleman (RSA) signature method includes: creating an initial hidden value using a private key and an RSA modular; converting a message to a hidden message by blinding the...
US20150092940 Method for Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields Countermeasure for Simple-Side Channel Attacks and C-Safe-Fault Attacks for Right-to-Left Algorithms  
The present invention describes a method which improves the safety aspects of the previously published atomic blocks for the right-to-left case. This method builds new sets of atomic blocks...
US20150010142 METHOD FOR AUTHENTICATED ENCRYPTION AND DECRYPTION  
In this invention, a new authenticated encryption and decryption technique has been proposed. In general, conventional encryption modes like (CTR, CBC, and CFB etc.) cannot provide integrity...
US20140340112 METHODS AND SYSTEMS FOR HARDWARE PIRACY PREVENTION  
Provided are methods, systems, and devices for preventing hardware piracy.
US20130114805 ENCRYPTION SYSTEM USING DISCRETE CHAOS FUNCTION  
Provided is an encryption system, which includes: an encryption round calculation unit for encrypting a plain text; and a substitution unit provided at the encryption round calculation unit and...
US20140314230 CRYPTOGRAPHY ON AN ELLIPTICAL CURVE  
A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X); and from polynomials X1(t), X2(t), X3(t) and U(t) satisfying:...
US20120082307 CRYPTOGRAPHY ON A ELLIPTICAL CURVE  
A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X); and from polynomials X1(t), X2(t), X3(t) and U(t) satisfying:...
US20110216900 METHODS OF ENCRYPTION AND DECRYPTION AND ENCRYPTION SYSTEMS USING THE SAME  
Provided is a decryption method of an encryption algorithm. In the decryption method, a secret key can be received. A plurality of Montgomery multiplications can be repeated on a cipher text until...
US20140334621 Method for Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields Countermeasure for Simple-Side Channel Attacks and C-Safe-Fault Attacks for Left-to-Right Algorithms  
The present invention describes a method which improves the safety aspects of the previously published atomic blocks. This method builds new sets of atomic blocks designed to protect against both...
US20140314229 CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE  
A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X) and from polynomials satisfying: −f(X1(t)).f(X2(t))=U(t)2 in the finite body Fq,...
US20120093309 CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE  
A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X) and from polynomials satisfying: −f(X1(t)).f(X2(t))=U(t)2 in the finite body Fq,...
US20150215117 WHITE BOX ENCRYPTION APPARATUS AND METHOD  
Disclosed are a white box encryption apparatus and method. The white box encryption method includes performing an encryption operation using a plurality of white box encryption tables for each of...
US20140177824 SYSTEM AND METHOD FOR SECURING SCALAR MULTIPLICATION AGAINST DIFFERENTIAL POWER ATTACKS  
The system and method for securing scalar multiplication against differential power attacks (DPAs) delays required point additions in elliptic curve cryptosystem scalar multiplication. A buffer is...
US20120114116 APPARATUS AND METHOD FOR STORING ELECTRONIC RECEIPTS ON A UNIFIED CARD  
A Unified Card system allows customers to store receipts on a Unified Card when making purchases from different retailer merchants. The customer purchases goods or services and the receipt is...
US20120027200 FLEXIBLE INTERFACE FOR SECUREINPUT OF PIN CODE  
The present invention concerns a system (10) and a process for authenticating a PIN code of a user in an interactive information system in order to run an application. It comprises input means...
US20140023191 Mass Serialization Analytics  
A method of determining whether a mass serialization engine is cryptographically secure is provided herein. The method includes performing (202) a specified number of mass serializations to...
US20130294599 PLUGGABLE CRYPTOGRAPHY  
Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher...
US20140369492 METHOD TO CALCULATE SQUARE ROOTS FOR ELLIPTIC CURVE CRYPTOGRAPHY  
A method is presented to compute square roots of finite field elements from the prime finite field of characteristic p over which points lie on a defined elliptic curve. Specifically, while...
US20140198911 SHARING A SECRET VIA LINEAR INTERPOLATION  
A method and system distributes shares of a secret among cooperating entities using linear interpolation. In one embodiment, a linear equation is formed using the secret and random elements. The...
US20150188713 METHOD TO REDUCE THE LATENCY OF ECDSA SIGNATURE GENERATION USING PRECOMPUTATION  
In order to reduce latency of elliptical curve digital signature generation a portion of the digital signature is pre-calculated before receipt of the message hash using an unmodified ECDSA...
US20130182836 SECRET SHARING SYSTEM, SECRET SHARING APPARATUS, SECRET SHARING METHOD, SECRET SORTING METHOD, SECRET SHARING PROGRAM  
A secret sharing system according to the present invention includes N secret sharing apparatuses. The secret sharing system according to the present invention includes fragment replacement means...
US20110182421 ENCIPHERMENT OF DIGITAL SEQUENCES BY REVERSIBLE TRANSPOSITION METHODS  
Methods for transposing elements of a sequence according to a rule, wherein the rule is derived from pseudo-noise or pseudo-noise like binary and non-binary sequences are disclosed. Sequences of...
US20130108038 SYSTEM AND METHOD FOR A COLLATZ BASED HASH FUNCTION  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a hash based on the Collatz conjecture. The Collatz conjecture is based on a set of...
US20100306541 HASH FUNCTION USING A CARD SHUFFLING PROCESS  
In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure. The process is based on the type of...
US20120269340 HIERARCHICAL ENCRYPTION/DECRYPTION DEVICE AND METHOD THEREOF  
A hierarchical encryption device for decrypting a ciphertext and outputting a plaintext is disclosed in the invention, wherein the ciphertext comprises an encrypted block and a plurality of...
US20120008767 SYSTEM FOR ENCRYPTING AND DECRYPTING A PLAINTEXT MESSAGE WITH AUTHENTICATION  
The described system and method provide for an encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence...
US20140177826 TECHNIQUES TO STRENGTHEN ONE-TIME PAD ENCRYPTION  
Apparati, methods, and computer-readable media for strengthening a one-time pad encryption system. A method embodiment of the present invention comprises the steps of encrypting plaintext (1) with...
US20110051928 TECHNIQUES TO STRENGTHEN ONE-TIME PAD ENCRYPTION  
Apparati, methods, and computer-readable media for strengthening a one-time pad encryption system. A method embodiment of the present invention comprises the steps of encrypting plaintext (1) with...
US20150086007 COMPACT, LOW POWER ADVANCED ENCRYPTION STANDARD CIRCUIT  
Embodiments of an invention for a compact, low power Advanced Encryption Standard circuit are disclosed. In one embodiment, an apparatus includes an encryption unit having a substitution box and...