Match Document Document Title
9031230 Encryption processing device, encryption processing method, and program  
A reduction in the size of encryption processing configuration applying generalized Feistel structures is achieved. The encryption processing configuration applies a generalized Feistel structure...
9031234 Encryption device and decryption device  
According to one embodiment, an encryption device includes a storage unit, an input unit, first to fourth partial encryption units, a generation unit, and an output unit. The first partial...
9031229 Computer-implemented system and method for providing data privacy in a cloud using discrete homomorphic encryption  
A homomorphic encryption algorithm is performed that encrypts at least a portion of a plurality of plaintext data items at a client computing device into homomorphic queries, each query including...
9031239 Information processing apparatus, information processing method, and computer readable storage medium  
An information processing apparatus includes an encrypting unit that encrypts a value to be kept secret with a predetermined cipher key. The information processing apparatus includes a converting...
9025766 Efficient hardware architecture for a S1 S-box in a ZUC cipher  
Efficient hardware architecture for a S1 S-box for a ZUC cipher is described. One circuit includes a first circuit to map an 8-bit input data of a Galois field GF(256) for a 8-bit data path for a...
9026803 Computing entities, platforms and methods operable to perform operations selectively using different cryptographic algorithms  
Described herein is a computing platform incorporating a trusted entity, which is controllable to perform cryptographic operations using selected ones of a plurality of cryptographic algorithms...
9014370 High performance hardware-based execution unit for performing C2 block cipher encryption/decryption  
A system and method for encrypting and/or decrypting data with a Cryptomeria (C2) cipher may be provided that generates C2 round keys in parallel. Accordingly, data may be encrypted or decrypted...
9007895 Method for routing data packets in a fat tree network  
In a method (400) for routing packets between a plurality of top switches (110a-110n) and a plurality of leaf switches (120a-120n) using a balancing table (204, 208, 210) in a fat tree network...
9002002 Method and apparatus of high speed encryption and decryption  
A hardware architecture for encryption and decryption device can improve the encryption and decryption data rate by using parallel processing, and pipeline operation, and save footprint by sharing...
9002000 Method for conversion of a first encryption into a second encryption  
A method for converting, by means of a conversion entity, a first digit into a second digit, the first cipher corresponding to the result of a symmetric probabilistic encryption of an plain...
8995650 Two non-orthogonal states quantum cryptography method and apparatus with intra- and inter-qubit interference for eavesdropper detection  
An apparatus and method for implementing a secure quantum cryptography system using two non-orthogonal states. For each qubit, the emitter station prepares a quantum system in one of two...
8983063 Method and system for high throughput blockwise independent encryption/decryption  
An encryption technique is disclosed for encrypting a plurality of data blocks of a data segment where the encryption selectively switches between a blockwise independent randomized (BIR)...
8972718 System and method for providing load balanced secure media content and data delivery in a distributed computing environment  
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content is segmented and encrypted into a set...
8971525 Method, module and system for providing cipher data  
A method of providing cipher data during a period of time when output of a primary source of cipher data is unavailable is disclosed. The method comprises switching from a primary source of cipher...
8958549 Countermeasure method and device for protecting data circulating in an electronic component  
The present disclosure relates to a countermeasure method in an integrated circuit comprising at least one first logic circuit and at least one first input register supplying the first logic...
8958551 Multi-dimensional montgomery ladders for elliptic curves  
An algorithm is provided having a matrix phase and point addition phase that permits computation of the combination of more than two point multiples. The algorithm has particular utility in...
8958550 Encryption operation with real data rounds, dummy data rounds, and delay periods  
An apparatus, method, system and computer-readable medium are provided for preserving an encryption of data when confronted by an attack, such as a side channel analysis (SCA) attack based on a...
8954740 Session key proxy decryption method to secure content in a one-to-many relationship  
A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure...
8942374 Encryption device  
According to an embodiment, an encryption device includes a symmetric-key operation unit; a division unit; an exclusive OR operation unit; a multiplication unit that performs multiplication on a...
8942371 Method and system for a symmetric block cipher using a plurality of symmetric algorithms  
A method and system for hybrid encryption wherein all of the round function variables including the encryption algorithm change for each round. This permits the generation of block sizes and key...
RE45327 Apparatus, systems and methods to provide authentication services to a legacy application  
Authentication credentials from legacy applications are translated to Kerberos authentication requests. Authentication credentials from the legacy application are directed to an authentication...
8924041 Vehicle central lock antitheft method and system  
A vehicle central lock antitheft method and system includes a central lock system which is connected by radio with a remote controller for identity verification using rolling codes (S101, S102),...
8925075 Method for protecting data used in cloud computing with homomorphic encryption  
A method for protection of cloud computing includes homomorphic encryption of data. Partially or fully homomorphic encryption allows for data within the cloud to be processed without decryption. A...
8923510 Method and apparatus for efficiently implementing the advanced encryption standard  
Implementations of Advanced Encryption Standard (AES) encryption and decryption processes are disclosed. In one embodiment of S-box processing, a block of 16 byte values is converted, each byte...
8913739 Method for scalar multiplication in elliptic curve groups over prime fields for side-channel attack resistant cryptosystems  
A method and device for transforming data with a secret parameter in an elliptic curve cryptosystem based on an elliptic curve defined over an underlying prime field, includes multiplying a point...
8908859 Cryptographic apparatus and memory system  
According to one embodiment, a cryptographic apparatus includes: cryptographic cores (“cores”), an assigning unit, a concatenating unit, and an output controlling unit. If a CTS flag thereof is...
8908861 AES algorithm-based encryption apparatus and method for mobile communication system  
A method and apparatus for improving hardware flexibility for encrypting data based on the Advanced Encryption Standard (AES) block algorithm is provided. An encryption apparatus is equipped with...
8898452 Protocol translation  
A system and method for securing data by receiving encrypted data at a security appliance transmitted from a client, wherein at least a portion of the encrypted data is encrypted according to a...
8891760 System for checking acceptance of string by automaton  
A server having an automaton whose state transitions in accordance with received characters, determines whether the automaton has transitioned to a final state on the basis of the characters. The...
8879725 Combining instructions including an instruction that performs a sequence of transformations to isolate one transformation  
The Advanced Encryption Standard (AES) is a symmetric block cipher that can encrypt and decrypt information. Encryption (cipher) performs a series of transformations (Shift Rows, Substitute Bytes,...
8869292 Method and device for 3D object protection by transformation of its points  
A 3D object is protected by a first device that receives the 3D object, generates translation vectors that are added to the points of the 3D object to obtain a protected 3D object, and outputs the...
8861720 Tamper-resistant memory integrated circuit and encryption circuit using same  
An integrated memory circuit applies to an S-box of a cryptographic circuit. The integrated memory circuit includes a row decoder, a column decoder, and a sense amplifier composed of a domino-RSL...
8855298 Table lookup operation on masked data  
Processing of masked data using table lookups is described. A mask is applied to input data to generate masked input data. The mask and the masked input data are used in combination to locate an...
8850204 Multi-band/multi-link secure key generation and delivery protocol  
A method is described for negotiating the use of multi-link ciphering and for the generation of unique keys for each of the links using a single 4-way handshake protocol exchange.
8848917 Verification of the integrity of a ciphering key  
A method for verifying the integrity of a key implemented in a symmetrical ciphering or deciphering algorithm, including the steps of complementing to one at least the key; and verifying the...
8850231 Data encryption using a key and moniker for mobile storage media adapted for library storage  
Disclosed are a method and apparatus for a data storage library comprising a plurality of drives and a combination bridge controller device adapted to direct and make compatible communication...
8837715 Method and apparatus for secure iterative processing and adaptive filtering  
Disclosed embodiments include methods and apparatuses for secure iterative processing of encrypted signals based on implementing a secure iterative processing protocol that avoids cipher blowup,...
8832441 Mobile terminal, data communication method, and computer program  
A mobile terminal includes a near-field communication device capable of performing near-field wireless communication with an external device, and a controller configured to instruct the external...
8824672 Reconfigurable block encryption logic  
Methods and systems for cryptography use a reconfigurable platform to perform cryptographic functions. Where a reconfigurable platform is use the configuration may be used as a key or secret. The...
8824671 Data converter, data conversion method, and computer program  
A data conversion algorithm achieving efficient data diffusion is achieved. For example, in a configuration where a various processes are executed on two data segments which are resultants of...
8826036 Ebook encryption using variable keys  
An electronic book distribution system encrypts distributed electronic books (“eBooks”) with a content key. The content key is in turn encrypted with a voucher key. The voucher key for a...
8819458 Information processing apparatus, program execution method, and computer program  
An information processing apparatus includes: a program executing unit which interprets and executes codes of a computer program created in a procedural language in an environment with a tamper...
8804951 Speeding up galois counter mode (GCM) computations  
Methods and apparatus to speed up Galois Counter Mode (GCM) computations are described. In one embodiment, a carry-less multiplication instruction may be used to perform operations corresponding...
8798270 Communication system and communication method  
To improve a communication system including two communication apparatuses in order to reduce a possibility of having communication thereof decrypted by a third party. The communication system...
8787565 Method and apparatus for generating an advanced encryption standard (AES) key schedule  
An Advanced Encryption Standard (AES) key generation assist instruction is provided. The AES key generation assist instruction assists in generating round keys used to perform AES encryption and...
8787566 Strong encryption  
An embodiment generally relates to a method of strong encryption. The method includes generating a first cryptographic key based on a random number and generating a second cryptographic key based...
8781111 System and methods for side-channel attack prevention  
A side channel attack utilizes information gained from the physical implementation of a cryptosystem. Software and hardware-based systems and methods for preventing side channel attacks are...
8769696 Automated detection of flaws and incompatibility problems in information flow downgraders  
Mechanisms for evaluating downgrader code in application code with regard to a target deployment environment. Downgrader code in the application code is identified. Based on an input string, an...
8767957 Communication encryption method and device  
An encryption method and device employing a modified low-resource AES algorithm. The algorithm in one embodiment has a 128-bit key and a 16-bit data type, along with optimization functions...
8762739 Microcontroller configured for external memory decryption  
In an advanced metering infrastructure environment, software program statements and/or data may be encrypted. A microcontroller unit may include a first cache configured to store a block of...