Matches 1 - 50 out of 123 1 2 3 >


Match Document Document Title
US20110161662 SYSTEM AND METHOD FOR UPDATING DIGITAL CERTIFICATE AUTOMATICALLY  
A system and method for automatically updating a digital certificate prompts a user of a client computer to update a current digital certificate if a period of validity of the current digital...
US20100316215 METHOD OF SHARING A STRONG SECRET BETWEEN TWO PARTIES, ONE OF WHOM HAS LITTLE PROCESSING POWER  
The invention relates to a method of sharing a strong secret F between two parties (A, B) previously sharing a weak secret F, this method of sharing combining a symmetric algorithm and an...
US20090086963 Systems and Methods for Protecting the Anonymity of Entities  
Systems and methods for protecting the anonymity of one or more entities comprising personalizing a reference associated with information about an entity using one or more codes associated with a...
US20130070922 TECHNIQUE FOR SECURELY COMMUNICATING AND STORING PROGRAMMING MATERIAL IN A TRUSTED DOMAIN  
A “trusted domain” is established within which content received from a communications network, e.g., a cable TV network, is protected from unauthorized copying thereof, in accordance with the...
US20110099369 FILE ENCRYPTION SYSTEM AND METHOD  
An electronic document comparison system and method converts a test file into a compressed file having a specific format. A public key of the CA certificate of a user is obtained and a random key...
US20140328483 METHOD FOR PRODUCING A HARDWARE DEVICE AND HARDWARE DEVICE  
A method for producing a hardware device, in particular a trusted platform module for the execution of at least one cryptographic algorithm, the hardware device corresponding to a real-time class,...
US20110208962 STREAMLINED PROCESS FOR ENROLLMENT OF MULTIPLE DIGITAL CERTIFICATES  
The enrollment process for purchasing multiple digital certificates configured using different cryptographic algorithms or hashing algorithms is streamlined. A certificate purchaser wishing to...
US20090245510 BLOCK CIPHER WITH SECURITY INTRINSIC ASPECTS  
A block cipher or other cryptographic process intended to be efficiently implemented in hardware (circuitry) includes an s-box (substitution operation) which does not require a look up table, but...
US20090279696 SYSTEM AND METHOD OF PERFORMING AUTHENTICATION  
Disclosed herein are systems, method and computer readable medium for providing authentication of an entity B by an entity A. In the method, entity A selects a value p, a range [a, b] and a...
US20100086127 EFFICIENT IMPLEMENTATION OF ARITHMETICAL SECURE HASH TECHNIQUES  
An apparatus including an initialization circuit and a hash computation circuit. The initialization circuit may be configured to present a number of initialization values. The hash computation...
US20090225984 System and method for delivering satellite services at multiple security levels  
The disclosed embodiments relate to a system and method for delivering satellite services at multiple security levels. More specifically, there is provided a method comprising determining a level...
US20090262925 Method for designing a secure hash function and a system thereof  
A system and method for designing a secure hash function is provided. Both of which have been designed for secure hash functionality, Secure Hash Algorithm (SHA-3) using pre processing (MP)...
US20050147244 Method for cryptographic transformation of binary data blocks  
A method for cryptographic transformation of a binary data block comprising the steps splitting said data block into N≧2 sub-blocks, alternately converting said sub-blocks by the operations...
US20090161864 BLOCK CIPHER ARIA SUBSTITUTION APPARATUS AND METHOD  
A block cipher ARIA substitution apparatus, the apparatus includes a first Sbox operation unit for performing operations of a substitution box S1 and a substitution box S1−1; a second Sbox...
US20110091034 Secure Method for Cryptographic Computation and Corresponding Electronic Component  
The secure method for cryptographic computation comprises processing of an input datum (D) by a cryptographic computation tool involving at least one encryption key (K) and at least one generated...
US20080130875 Low-cost pseudo-random nonce value generation system and method  
Briefly, a low-cost system and method for pseudo-random nonce value generation is disclosed.
US20090210722 System for and method of locking and unlocking a secret using a fingerprint  
The present invention provides a way to lock a secret in a portable package. The package contains the key needed to unlock it. The key is dispersed throughout the encrypted data so that an...
US20070217602 Method for fast quotient guess and congruencies manipulation  
A processor-executed computational method especially for use in cryptographic systems quickly determines a polynomial quotient under specific conditions. For a polynomial modulus f(x), a maximum...
US20090116640 Distributed search methods for time-shifted and live peer-to-peer video streaming  
Systems, devices and methods for supporting live and time-shifted video streaming via distributed search methods for registering and locating cached portions of video streams shared in...
US20150104011 PRESERVATION OF ENCRYPTION  
An apparatus, method, system and computer-readable medium are provided for preserving an encryption of data when confronted by an attack, such as a side channel analysis (SCA) attack based on a...
US20130064362 PRESERVATION OF ENCRYPTION  
An apparatus, method, system and computer-readable medium are provided for preserving an encryption of data when confronted by an attack, such as a side channel analysis (SCA) attack based on a...
US20080155252 VLAN tunneling  
According to one embodiment of the invention, a method for establishing multiple tunnels for each virtual local area network is described. Upon receiving information over a first tunnel associated...
US20080005567 METHOD AND SYSTEM FOR PERSONALIZING SMART CARDS USING ASYMMETRIC KEY CRYPTOGRAPHY  
Systems and methods are described that permit a smart card to be personalized in a secure manner using asymmetric cryptography. Systems and methods are described whereby personalization...
US20090208005 KEY GENERATING DEVICE, ENCRYPTING DEVICE, RECEIVING DEVICE, KEY GENERATING METHOD, ENCRYPTING METHOD, KEY PROCESSING METHOD, AND PROGRAM  
A key generating device according to an embodiment of the present invention includes: a parameter determining unit that randomly determines a plurality of parameters that are needed when...
US20060147041 DES algorithm-based encryption method  
Applicable in communications systems in the sending of data among user equipment of nodes connected to a network. It is characterised in that it comprises generating random keys (6) that are...
US20090316899 ENCRYPTION/DECRYPTION DEVICE AND SECURITY STORAGE DEVICE  
Provided are an encryption/decryption device and a security storage device including same. The encryption/decryption device includes a first enc/decrypter, a second enc/decrypter, a controller...
US20100166176 Elliptical polynomial-based message authentication code  
The elliptic-polynomial based Message Authentication Code (MAC) provides MAC generation methods based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic...
US20080292100 NON-LINEAR DATA CONVERTER, ENCODER AND DECODER  
According to an aspect of the present invention, there is provided a non-linear data converter including: first to fourth converters that each performs a respective converting process on an input...
US20100183146 PARALLELIZABLE INTEGRITY-AWARE ENCRYPTION TECHNIQUE  
The present disclosure provides a parallelizable integrity-aware encryption technique. In at least one embodiment of the present disclosure, a parallelizable integrity-aware encryption method...
US20100269174 SYSTEMS AND METHODS FOR GENERATING A DNS QUERY TO IMPROVE RESISTANCE AGAINST A DNS ATTACK  
The present solution provides systems and methods for generating DNS queries that are more resistant to being compromised by attackers. To generate the transaction identifier, the DNS resolver...
US20090202070 Robust Cipher Design  
In an iterated block cipher, a method for round key encryption and key generation, the method including providing a first function Fi and a second function Fj, providing a round key generation...
US20080285744 Block Ciphering System, Using Permutations to Hide the Core Ciphering Function of Each Encryption Round  
In a system (600), a server (610) provides a digital signal processing function ƒ to an executing device (620) in an obfuscated form. The function ƒ includes a function cascade of signal...
US20090080647 Method and System for Usage of Block Cipher Encryption  
A block cipher system for encrypting a plurality of blocks from plaintext to ciphertext, each of the blocks being associated with a constant root key, the system including an encryption key module...
US20100098244 SYSTEM AND METHOD FOR STREAM/BLOCK CIPHER WITH INTERNAL RANDOM STATES  
Disclosed herein are systems, methods, and computer readable-media for performing data encryption and decryption using a stream or block cipher with internal random states. The method includes...
US20110255688 METHOD AND SYSTEM FOR MONITORING ONLINE COMPUTER NETWORK BEHAVIOR AND CREATING ONLINE BEHAVIOR PROFILES  
A method and system for monitoring users on one or more computer networks, disassociating personally identifiable information from the collected data, and storing it in a database so that the...
US20090207998 DETERMINING UNIQUE MATERIAL IDENTIFIER NUMBERS USING CHECKSUM VALUES  
A system and method for determining unique material identifier numbers using checksum values are disclosed herein. The system and method involves providing a set of data, loading the set of data...
US20090097639 AES ENCRYPTION/DECRYPTION CIRCUIT  
This invention makes the number of cycles required for AES encryption or decryption by hardware smaller than before by reducing the difference among the summation of the signal processing time for...
US20080250249 Data access method against cryptograph attack  
The present invention discloses a data access method accomplished by the following steps of: creating a predetermined password; generating a first encryption key; encrypting data based on the...
US20080130874 RUNTIME CONFIGURABILITY FOR CRT & NON CRT MODE  
A cryptographic engine for modulo N multiplication, which is structured as a plurality of almost identical, serially connected Processing Elements, is controlled so as to accept input in blocks...
US20080292099 Two Non-Orthogonal States Quantum Cryptography Method and Apparatus with Inter-and Inter-Qubit Interference for Eavesdropper Detection  
An apparatus and method for implementing a secure quantum cryptography system using two non-orthogonal states. For each qubit, the to emitter station prepares a quantum system in one of two...
US20090103718 ENCRYPTION AND DECRYPTION METHODS  
Encryption methods are provided. A data block is selected from a plurality of data blocks. A sentry block is determined. The selected data block is encrypted according to the sentry block to...
US20080112560 ARITHMETIC METHOD AND APPARATUS FOR SUPPORTING AES AND ARIA ENCRYPTION/DECRYPTION FUNCTIONS  
Provided are an arithmetic method and apparatus for supporting Advanced Encryption Standard (AES) and Academy, Research Institute and Agency (ARIA) encryption/decryption functions. The apparatus...
US20070263859 Protection of the execution of a DES algorithm  
A method for protecting an execution, by an integrated circuit, of a ciphering and/or deciphering algorithm taking into account data and at least one valid key and performing several iterations of...
US20090257582 Block-based stream encryption/decryption processing method  
A block-based stream encryption/decryption processing method for applying a matrix architecture of diffusion algebra includes the steps of (a) selecting a private key and a pairing private key;...
US20080130876 Method for Private-Key Encryption of Messages, and Application to an Installation  
The invention concerns a multiple private key and secondary key cryptography method, including segmentation into blocks having a specific number of characters, and, for each block, a first step of...
US20150043729 INSTRUCTION AND LOGIC TO PROVIDE A SECURE CIPHER HASH ROUND FUNCTIONALITY  
Instructions and logic provide secure cipher hashing algorithm round functionality. Some embodiments include a processor comprising: a decode stage to decode an instruction for a secure cipher...
US20100054461 SYSTEMS AND METHODS FOR IMPLEMENTING BLOCK CIPHER ALGORITHMS ON ATTACKER-CONTROLLED SYSTEMS  
Systems and methods for an implementation of block cipher algorithms (e.g., AES) use lookup tables to obscure key information, increasing difficulty for those with privileged access to a system...
US20100040226 DEVICE, PROGRAM AND METHOD FOR GENERATING HASH VALUES  
The invention aims to provide a hash function whose safety can be evaluated. To achieve this, a message that is input to a message blocking unit 122 is split into multiple message blocks, and...
US20090222667 GENERATOR FOR GENERATING A MESSAGE AUTHENTICATION CODE, METHOD OF GENERATING A MESSAGE AUTHENTICATION CODE, PROGRAM ELEMENT AND COMPUTER-READABLE MEDIUM  
Current MAC algorithms impose a significant system performance requirement in order to process messages in real time. According to an exemplary embodiment of the present invention, a hardware...
US20060153363 PLASMA DISPLAY APPARATUS  
This document relates to a plasma display apparatus, and more particularly, to a plasma display apparatus that drives electrodes. A plasma display apparatus according to an embodiment of the...

Matches 1 - 50 out of 123 1 2 3 >