СПИСОК патентов США - подгруппа МПК16 H04L9/06
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9608819 | Learning parity with noise-based relational encryption for proximity relations | |||
2 | 9608817 | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management | |||
3 | 9608812 | Common secret key generation device, encryption device, decryption device, common secret key generation method, encryption method, decryption method, and program | |||
4 | 9608803 | Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption | |||
5 | 9608802 | Decoy bits method for direct encryption and key generation | |||
6 | 9602479 | Encryption based on network information | |||
7 | 9602281 | Parallelizable cipher construction | |||
8 | 9602280 | System and method for content encryption in a key/value store | |||
9 | 9602273 | Implementing key scheduling for white-box DES implementation | |||
10 | 9602095 | Multiplexer circuit, computer-readable recording medium having stored therein program for designing multiplexer circuit, and apparatus for designing multiplexer circuit | |||
11 | 9600421 | Systems and methods for low-latency encrypted storage | |||
12 | 9600238 | Fully digital chaotic differential equation-based systems and methods | |||
13 | 9596598 | Reducing detectability of an encryption key | |||
14 | 9596081 | Order preserving tokenization | |||
15 | 9596079 | Secure telecommunications | |||
16 | 9596075 | Transparent serial encryption | |||
17 | 9594580 | Secure storage and accelerated transmission of information over communication networks | |||
18 | 9590955 | Methods and systems for providing information relating to an event | |||
19 | 9590951 | One-time pad communications network | |||
20 | 9589151 | Techniques and architecture for anonymizing user data | |||
21 | 9588705 | Efficient elimination of access to data on a writable storage media | |||
22 | 9584495 | Method and system for establishing secure communications using composite key cryptography | |||
23 | 9584488 | Data encryption cipher using rotating ports | |||
24 | 9584323 | Compressing encrypted data without the encryption key | |||
25 | 9584315 | Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof | |||
26 | 9584313 | Streaming one time pad cipher using rotating ports for data encryption | |||
27 | 9584312 | Methods and systems for storing and retrieving data | |||
28 | 9584310 | Protecting a white-box implementation against attacks | |||
29 | 9583704 | Complementary resistance switch, contact-connected polycrystalline piezo- or ferroelectric thin-film layer, method for encrypting a bit sequence | |||
30 | 9577996 | Computer system and method for encrypted remote storage | |||
31 | 9577992 | Data encryption/decryption using neuro and neuro-mechanical fingerprints | |||
32 | 9577822 | Secure bitstream authentication | |||
33 | 9576133 | Detection of data tampering of encrypted data | |||
34 | 9571281 | CRT-RSA encryption method and apparatus | |||
35 | 9571270 | Construction and uses of variable-input-length tweakable ciphers | |||
36 | 9571269 | Encryption device, encryption method and program | |||
37 | 9571268 | Method and system for homomorphicly randomizing an input | |||
38 | 9569639 | Remapping constant points in a white-box implementation | |||
39 | 9569623 | Secure boot with resistance to differential power analysis and other external monitoring attacks | |||
40 | 9569210 | Apparatus and method of execution unit for calculating multiple rounds of a skein hashing algorithm | |||
41 | 9565472 | Apparatus and methods for content transfer protection | |||
42 | 9565018 | Protecting cryptographic operations using conjugacy class functions | |||
43 | 9563769 | System and method for secure loading data in a cache memory | |||
44 | 9560040 | Mitigating risk of account enumeration | |||
45 | 9559844 | Non-linear processor, stream-cipher encrypting device, stream-cipher decrypting device, mask processing method, stream-cipher encrypting method, stream-cipher decrypting method, and program | |||
46 | 9559838 | Method of processing data protected against fault injection attacks and associated device | |||
47 | 9559837 | Methods for cryptographic delegation and enforcement of dynamic access to stored data | |||
48 | 9558374 | Methods and systems for securing stored information | |||
49 | 9553721 | Secure execution environment communication | |||
50 | 9553719 | Transmitting terminal, receiving terminal, ID numbering device, and key transmission method | |||
51 | 9552494 | Protected indexing and querying of large sets of textual data | |||
52 | 9552191 | Secure random number generation | |||
53 | 9548737 | Method for manufacturing a digital circuit and digital circuit | |||
54 | 9547777 | Validating compressed archive keys | |||
55 | 9544277 | KAFKA: A cellular automation / complex Fibonacci sequences-based technique for encrypting and decrypting audio, video and text messages | |||
56 | 9544139 | Method and apparatus for a non-deterministic random bit generator (NRBG) | |||
57 | 9544133 | On-the-fly key generation for encryption and decryption | |||
58 | 9544131 | Efficient modular addition resistant to side channel attacks | |||
59 | 9542561 | Instructions processors, methods, and systems to process secure hash algorithms | |||
60 | 9542158 | T-sequence apparatus and method for general deterministic polynomial-time primality testing and composite factoring | |||
61 | 9537652 | Polymorphic encryption key allocation scheme | |||
62 | 9537651 | Information processing apparatus, information processing method, and program | |||
2016 | |||||
63 | 9531916 | Preventing pattern recognition in electronic code book encryption | |||
64 | 9531531 | Methods and devices for fixed execution flow multiplier recoding and scalar multiplication | |||
65 | 9525546 | Cryptographic operation by applying sub-keys to multiplication units in accordance with galois-field arithmetic | |||
66 | 9525435 | Computing device storing look-up tables for computation of a function | |||
67 | 9521203 | Communication session processing | |||
68 | 9520992 | Logical-to-physical address translation for a removable data storage device | |||
69 | 9515821 | Apparatus and method for data encryption | |||
70 | 9515820 | Protection against side channels | |||
71 | 9515819 | Pluggable cryptography | |||
72 | 9515818 | Multi-block cryptographic operation | |||
73 | 9515675 | Interface circuit operating to recover error of transmitted data | |||
74 | 9514330 | Meta-complete data storage | |||
75 | 9509665 | Protecting against malicious modification in cryptographic operations | |||
76 | 9509508 | Generating a session key for authentication and secure data transfer | |||
77 | 9509495 | Data protection method and apparatus | |||
78 | 9509414 | Encryption and decryption method and device | |||
79 | 9503435 | Load balancing hash computation for network switches | |||
80 | 9503434 | Single-pass data compression and encryption | |||
81 | 9503255 | Cryptographic sequencing system and method | |||
82 | 9497175 | Iterative data secret-sharing transformation | |||
83 | 9497021 | Device for generating a message authentication code for authenticating a message | |||
84 | 9494645 | Method for testing cryptographic circuits, secured cryptographic circuit capable of being tested, and method for wiring such circuit | |||
85 | 9491389 | Focal plane array processing method and apparatus | |||
86 | 9490971 | Instruction for fast ZUC algorithm processing | |||
87 | 9490970 | Methods and system for secure communication between an RFID tag and a reader | |||
88 | 9489521 | Format preserving encryption methods for data strings with constraints | |||
89 | 9489508 | Device functionality access control using unique device credentials | |||
90 | 9485222 | Data stream traffic control | |||
91 | 9485088 | Systems and methods for dynamic data masking | |||
92 | 9485087 | Method and circuit for cryptographic operation | |||
93 | 9483656 | Efficient and secure data storage utilizing a dispersed data storage system | |||
94 | 9479616 | Systems and methods for transformation of logical data objects for storage | |||
95 | 9479327 | Apparatus and method for generating key | |||
96 | 9477839 | Methods for centralized privacy-preserving collaborative threat mitigation | |||
97 | 9477830 | Controlled and client-side authentication module | |||
98 | 9473296 | Instruction and logic for a simon block cipher | |||
99 | 9473176 | Implementation of log and inverse operation in a Galois Field | |||
100 | 9467286 | Encryption device, decryption device, encryption method, decryption method, and program | |||
101 | 9467279 | Instructions and logic to provide SIMD SM4 cryptographic block cipher functionality | |||
102 | 9465961 | Methods and circuits for securing proprietary memory transactions | |||
103 | 9465582 | Significant random number generator | |||
104 | 9461818 | Method for encrypting a program for subsequent execution by a microprocessor configured to decrypt and execute the encrypted program | |||
105 | 9461816 | Methods, systems and apparatus to reduce processor demands during encryption | |||
106 | 9461815 | Virtualized AES computational engine | |||
107 | 9460315 | Order-preserving encryption system, device, method, and program | |||
108 | 9460312 | Data integrity protection from rollback attacks for use with systems employing message authentication code tags | |||
109 | 9459833 | System and method with specific ordered execution over physical elements | |||
110 | 9455967 | Load balancing hash computation for network switches | |||
111 | 9455966 | Load balancing hash computation for network switches | |||
112 | 9455962 | Protecting memory interface | |||
113 | 9455833 | Behavioral fingerprint in a white-box implementation | |||
114 | 9454494 | Encrypting a communication from a device | |||
115 | 9450749 | One-time-pad encryption with central key service | |||
116 | 9450748 | Decryption of content including partial-block discard | |||
117 | 9449179 | Information processor | |||
118 | 9445265 | Method and device for processing SRVCC switching, and terminal | |||
119 | 9444619 | Generation of randomized messages for cryptographic hash functions | |||
120 | 9444495 | System and method of interfacing co-processors and input/output devices via a main memory system | |||
121 | 9443091 | Method and system for protecting execution of cryptographic hash functions | |||
122 | 9443066 | Decrypting content samples including distinct encryption chains | |||
123 | 9442890 | Distribution apparatus, restoration apparatus, distribution method, restoration method, and distribution and restoration system | |||
124 | 9438416 | Customizable encryption algorithm based on a sponge construction with authenticated and non-authenticated modes of operation | |||
125 | 9438414 | Virtualized SHA computational engine | |||
126 | 9438413 | Generating and merging keys for grouping and differentiating volumes of files | |||
127 | 9432187 | Data scrambling initialization | |||
128 | 9432181 | Device, method, and program for format-preserving encryption, and device, method, and program for decryption | |||
129 | 9432180 | Method and system for a programmable parallel computation and data manipulation accelerator | |||
130 | 9430650 | Method for managing memory space in a secure non-volatile memory of a secure element | |||
131 | 9426659 | Service activation using algorithmically defined key | |||
132 | 9425961 | Method for performing an encryption of an AES type, and corresponding system and computer program product | |||
133 | 9425954 | Device and method for resonant cryptography | |||
134 | 9425953 | Generating multiple secure hashes from a single data buffer | |||
135 | 9425952 | Algebraic manipulation detection codes from algebraic curves | |||
136 | 9420008 | Method for repurposing of communications cryptographic capabilities | |||
137 | 9419952 | Memory encryption method compatible with a memory interleaved system and corresponding system | |||
138 | 9419792 | Instruction for accelerating SNOW 3G wireless security algorithm | |||
139 | 9419791 | Hash value calculation device, hash value calculation method, and non-transitory computer-readable storage medium including computer executable instruction | |||
140 | 9418246 | Decryption systems and related methods for on-the-fly decryption within integrated circuits | |||
141 | 9418245 | Encryption processing device, encryption processing method, and program | |||
142 | 9417951 | Method and apparatus for cipher fault detection | |||
143 | 9408079 | Apparatus and method for communication security in a nationwide wireless network using wireless routers | |||
144 | 9407437 | Secure initialization vector generation | |||
145 | 9405919 | Dynamic encryption keys for use with XTS encryption systems employing reduced-round ciphers | |||
146 | 9405537 | Apparatus and method of execution unit for calculating multiple rounds of a skein hashing algorithm | |||
147 | 9401804 | Leakage resilient garbled circuit generation using reduced memory hardware token | |||
148 | 9401803 | Flexible scrambler/descrambler architecture for a transceiver | |||
149 | 9397753 | Pluggable transceiver module with enhanced circuitry | |||
150 | 9396340 | Method for encrypting a 3D model file and system thereof | |||
151 | 9396136 | Cascaded data encryption dependent on attributes of physical memory | |||
152 | 9391770 | Method of cryption | |||
153 | 9390292 | Encrypted digital circuit description allowing circuit simulation | |||
154 | 9389855 | Arithmetic device | |||
155 | 9385954 | Hashing techniques for use in a network environment | |||
156 | 9384484 | Secure content distribution system | |||
157 | 9379887 | Efficient cryptographic key stream generation using optimized S-box configurations | |||
158 | 9374219 | Method and apparatus for securing access to an integrated circuit | |||
159 | 9374218 | Method for conducting data encryption and decryption using symmetric cryptography algorithm and table look-up device | |||
160 | 9369274 | Cipher text translation | |||
161 | 9367693 | Bitstream confirmation for configuration of a programmable logic device | |||
162 | 9367690 | Encryption and decryption methods applied on operating system | |||
163 | 9363078 | Method and apparatus for hardware-accelerated encryption/decryption | |||
164 | 9363074 | Encryption processing apparatus, encryption processing method, and computer program | |||
165 | 9363073 | Cryptographic countermeasure method by deriving a secret data | |||
166 | 9363034 | Method to encrypt information that is transferred between two communication units | |||
167 | 9361617 | Variable-length cipher system and method | |||
168 | 9357432 | Media streaming with high rate availability | |||
169 | 9356860 | Managing external communications for provided computer networks | |||
170 | 9355374 | Systems and methods for creating fingerprints of encryption devices | |||
171 | 9350544 | Apparatus for encrypting data | |||
172 | 9350539 | Secure distribution of content | |||
173 | 9350534 | Method and apparatus for pipelined byte substitution in encryption and decryption | |||
174 | 9344278 | Secure data transfer using random ordering and random block sizing | |||
175 | 9344277 | Mass serialization analytics | |||
176 | 9344274 | Method and system for encrypting data | |||
177 | 9342712 | Method and system for accelerating cryptographic processing | |||
178 | 9342709 | Pattern detection | |||
179 | 9336160 | Low latency block cipher | |||
180 | 9331848 | Differential power analysis resistant encryption and decryption functions | |||
181 | 9326142 | Cryptographic key generation | |||
182 | 9325642 | Randomness for encryption operations | |||
183 | 9325498 | Performing AES encryption or decryption in multiple modes with a single instruction | |||
184 | 9319878 | Streaming alignment of key stream to unaligned data stream | |||
185 | 9317719 | SM3 hash algorithm acceleration processors, methods, systems, and instructions | |||
186 | 9317462 | Microcontroller peripheral data transfer redirection for resource sharing | |||
187 | 9317451 | Nonvolatile semiconductor storage device having encrypting arithmetic device | |||
188 | 9317286 | Apparatus and method for implementing instruction support for the camellia cipher algorithm | |||
189 | 9313248 | Method and apparatus for delivering encoded content | |||
190 | 9313023 | Format-preserving cipher | |||
191 | 9311459 | Application-driven playback of offline encrypted content with unaware DRM module | |||
192 | 9305184 | Packet-processing scheduler, security context, authentication, packet header, air cipher subsystem | |||
193 | 9304941 | Self-encrypting flash drive | |||
194 | 9298947 | Method for protecting the integrity of a fixed-length data structure | |||
195 | 9298941 | Secure data copying | |||
196 | 9294916 | Methods and apparatuses generating a radio base station key in a cellular radio system | |||
197 | 9294268 | System and method for variable length encryption | |||
198 | 9294266 | Method and apparatus to encrypt plaintext data | |||
199 | 9292707 | System and method for cascading token generation and data de-identification | |||
200 | 9288041 | Apparatus and method for performing compression operation in hash algorithm | |||
201 | 9288040 | Encryption device | |||
202 | 9286454 | Method of identifying a user by means of modified biometric characteristics, and a database for implementing the method | |||
203 | 9282082 | Compressing encrypted data without the encryption key | |||
204 | 9281940 | Information processing apparatus, information processing method, and program | |||
205 | 9276911 | Secure and scalable mapping of human sequencing reads on hybrid clouds | |||
206 | 9276745 | Preserving image privacy when manipulated by cloud services | |||
207 | 9271256 | Verifying generic broadcast of location assistance data | |||
208 | 9270462 | Method and system for conducting high speed, symmetric stream cipher encryption | |||
209 | 9270458 | Encryption processing device, encryption processing method, and program | |||
210 | 9270456 | System and methodology for decrypting encrypted media | |||
211 | 9270445 | Solid state disk and input/output method | |||
212 | 9268918 | Encryption and decryption of a dataset in at least two dimensions | |||
213 | 9264404 | Encrypting data using time stamps | |||
214 | 9264234 | Secure authentication of identification for computing devices | |||
215 | 9264222 | Precomputing internal AES states in counter mode to protect keys used in AES computations | |||
216 | 9264221 | Systems and methods for faster public key encryption using the associated private key portion | |||
217 | 9252953 | Instruction for performing a pseudorandom number generate operation | |||
218 | 9252945 | Method for recognizing a manipulation of a sensor and/or sensor data of the sensor | |||
219 | 9252944 | Key wrapping for common cryptographic architecture (CCA) key token | |||
220 | 9252943 | Parallelizable cipher construction | |||
221 | 9252756 | Random number generating device | |||
222 | 9251377 | Instructions processors, methods, and systems to process secure hash algorithms | |||
223 | 9251374 | Instructions to perform JH cryptographic hashing | |||
224 | 9246890 | PGP encrypted data transfer | |||
225 | 9246672 | Two indices moving in opposite directions for cryptographic bidirectional communications using a shared master key | |||
226 | 9245148 | Secure storage and accelerated transmission of information over communication networks | |||
227 | 9240885 | Cryptographic processing apparatus, cryptographic processing method, and computer program therefor | |||
228 | 9237441 | Method and apparatus for configuring signaling radio bearer in a wireless communications system | |||
229 | 9237014 | Partial CipherText updates using variable-length segments delineated by pattern matching and encrypted by fixed-length blocks | |||
230 | 9237008 | Encryption device, encryption method, and encryption program | |||
231 | 9237007 | Secure modulation and demodulation | |||
232 | 9237006 | Table-connected tokenization | |||
233 | 9235712 | Securing external memory data | |||
234 | 9232390 | Methods and apparatuses generating a radio base station key in a cellular radio system | |||
235 | 9230120 | Architecture and instruction set for implementing advanced encryption standard (AES) | |||
2015 | |||||
236 | 9225717 | Event-based data signing via time-based one-time authentication passcodes | |||
237 | 9225708 | Method for authenticated encryption and decryption | |||
238 | 9225525 | Identity management certificate operations | |||
239 | 9225521 | Apparatus and method for skein hashing | |||
240 | 9223824 | Systems and methods for scrubbing confidential insurance account data | |||
241 | 9219606 | Method and device for digital data blocks encryption and decryption | |||
242 | 9218297 | Systems and methods for transformation of logical data objects for storage | |||
243 | 9218158 | N-valued shift registers with inverter reduced feedback logic functions | |||
244 | 9215219 | Method for protecting data used in cloud computing with homomorphic encryption | |||
245 | 9213696 | Methods and systems for securely accessing translation resource manager | |||
246 | 9210133 | Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |||
247 | 9209967 | Precalculated encryption key | |||
248 | 9208357 | FPGA configuration bitstream protection using multiple keys | |||
249 | 9208333 | Secure data recorder | |||
250 | 9203811 | Authenticated encryption support in ISO/IEC 23009-4 | |||
251 | 9203609 | Method and apparatus for implementing key stream hierarchy | |||
252 | 9197412 | Low-complexity electronic circuit protected by customized masking | |||
253 | 9191211 | Data security system | |||
254 | 9191198 | Method and device using one-time pad data | |||
255 | 9191197 | AES encryption/decryption circuit | |||
256 | 9189425 | Protecting look up tables by mixing code and operations | |||
257 | 9184916 | System and method for using a streaming protocol | |||
258 | 9182967 | Method for safely downloading application | |||
259 | 9178699 | Public key encryption algorithms for hard lock file encryption | |||
260 | 9178694 | Securing backing storage data passed through a network | |||
261 | 9172533 | Method and system for securing communication | |||
262 | 9171136 | Data protection method and device | |||
263 | 9166793 | Efficient authentication for mobile and pervasive computing | |||
264 | 9166789 | Cryptographic processing apparatus | |||
265 | 9160974 | Systems and methods for transcoding and place shifting media content | |||
266 | 9160734 | Service activation using algorithmically defined key | |||
267 | 9160698 | Methods and systems for providing information relating to an event | |||
268 | 9160525 | Apparatus and method for key update for use in a block cipher algorithm | |||
269 | 9160524 | Method and system for recovering cryptographic operations and/or secrets | |||
270 | 9160523 | Apparatus and method to prevent side channel power attacks in advanced encryption standard | |||
271 | 9158931 | Block encryption method and block decryption method having integrity verification | |||
272 | 9154295 | Method of generating a correspondence table for a cryptographic white box | |||
273 | 9152805 | Security device | |||
274 | 9152801 | Cryptographic system of symmetric-key encryption using large permutation vector keys | |||
275 | 9152579 | Meta-complete data storage | |||
276 | 9147090 | Mesh grid protection system | |||
277 | 9143326 | Method and system for encrypting data | |||
278 | 9143317 | Protecting against white box attacks using column rotation | |||
279 | 9143027 | Intelligent power supervisor | |||
280 | 9141831 | Scheduler, security context cache, packet processor, and authentication, encryption modules | |||
281 | 9137304 | Method and apparatus for achieving data security in a distributed cloud computing environment | |||
282 | 9137178 | Tracking packets through a cloud computing environment | |||
283 | 9137013 | Method and system for a hardware-efficient universal hash function | |||
284 | 9137011 | Rapid data encryption and decryption for secure communication over open channels with plausible deniability | |||
285 | 9135834 | Apparatus and method to prevent side channel power attacks in advanced encryption standard using floating point operation | |||
286 | 9135450 | Systems and methods for protecting symmetric encryption keys | |||
287 | 9130909 | Data management apparatus, power usage calculation system, and data management method | |||
288 | 9130739 | Method and apparatus for nonlinear IV setup in keystream generators | |||
289 | 9129671 | Semiconductor device identifier generation method and semiconductor device | |||
290 | 9124420 | Encryption processing device and encryption processing method | |||
291 | 9124418 | Method and system for encryption of blocks of data | |||
292 | 9124417 | Computation of garbled tables in garbled circuit | |||
293 | 9122882 | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |||
294 | 9119167 | Generic broadcast of location assistance data | |||
295 | 9118481 | Method and system for efficiently generating a high quality pseudo-random sequence of numbers with extraordinarily long periodicity | |||
296 | 9112886 | Method and system for providing centralized data field encryption, and distributed storage and retrieval | |||
297 | 9111122 | Asymmetric cryptographic device with local private key generation and method therefor | |||
298 | 9104842 | Data protection method and device | |||
299 | 9104610 | Method, system and medium for analog encryption in a flash memory | |||
300 | 9104400 | Cryptographic support instructions | |||
301 | 9100184 | Instructions processors, methods, and systems to process BLAKE secure hashing algorithm | |||
302 | 9100183 | Computer program product and method for order preserving symbol based encryption | |||
303 | 9100170 | File packing and unpacking method, and device thereof | |||
304 | 9098712 | Encrypting operating system | |||
305 | 9094195 | Protecting de-duplication repositories against a malicious attack | |||
306 | 9092644 | Method and system for protecting memory information in a platform | |||
307 | 9088805 | Encrypted memory device and methods for use therewith | |||
308 | 9087187 | Unique credentials verification | |||
309 | 9083528 | Authentication of encrypted data blocks | |||
310 | 9083507 | Data processing device, data processing method, and program | |||
311 | 9083506 | Cryptographic processing apparatus and cryptographic processing method, and computer program | |||
312 | 9083489 | Block encryption method and apparatus | |||
313 | 9077526 | Method and system for ensuring sequential playback of digital media | |||
314 | 9076164 | Method and apparatus for performing targeted advertising in documents | |||
315 | 9071420 | Information processing apparatus, tampering detection apparatus, information processing method, tampering detection method, and computer product | |||
316 | 9071416 | Galois/counter mode encryption in a wireless network | |||
317 | 9071408 | Communication system | |||
318 | 9069988 | Detecting key corruption | |||
319 | 9066117 | Container agnostic encryption device and methods for use therewith | |||
320 | 9065654 | Parallel encryption/decryption | |||
321 | 9065642 | Intercepting key sessions | |||
322 | 9065632 | Message authentication using a universal hash function computed with carryless multiplication | |||
323 | 9065631 | Integrated cryptographic module providing confidentiality and integrity | |||
324 | 9059866 | Digital microwave radio system and method with encryption | |||
325 | 9059851 | Method and computer program product for order preserving symbol based encryption | |||
326 | 9059838 | Encryption algorithm with randomized buffer | |||
327 | 9054871 | Physical key-protected one time pad | |||
328 | 9054870 | Information security based on eigendecomposition | |||
329 | 9054857 | Parallelizeable integrity-aware encryption technique | |||
330 | 9053300 | Device and a method for generating software code | |||
331 | 9025766 | Efficient hardware architecture for a S1 S-box in a ZUC cipher | |||
332 | 9021268 | Method, computer system, and computer program product for password generation | |||
333 | 9008313 | System and method for generating random key stream cipher texts | |||
334 | 9002014 | On-die cryptographic apparatus in a secure microprocessor | |||
335 | 8983063 | Method and system for high throughput blockwise independent encryption/decryption | |||
336 | 8958550 | Encryption operation with real data rounds, dummy data rounds, and delay periods | |||
337 | 8930694 | Method for the generation of a code, and method and system for the authorization of an operation | |||
338 | 8929542 | Cryptographic processing system, key generation device, key delegation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program | |||
2014 | |||||
339 | 8861720 | Tamper-resistant memory integrated circuit and encryption circuit using same | |||
340 | 8824677 | Provably secure and efficient pseudorandom number generation | |||
341 | 8804952 | System and method for securing scalar multiplication against differential power attacks | |||
342 | 8799664 | Small public-key based digital signatures for authentication | |||
343 | 8774402 | Encryption/decryption apparatus and method using AES rijndael algorithm | |||
344 | 8767965 | Method for a public-key infrastructure providing communication integrity and anonymity while detecting malicious communication | |||
345 | 8767954 | Methods and systems for deriving a cryptographic framework | |||
346 | 8745726 | Identity verification in virtual worlds using encoded data | |||
347 | 8732485 | Methods for process key rollover/re-encryption and systems thereof | |||
348 | 8731189 | Information processing device, information processing method | |||
349 | 8712057 | Apparatus and method for an iterative cryptographic block | |||
350 | 8707033 | Information processing apparatus and information processing method | |||
351 | 8693681 | Kasumi cipher executable instructions and circuitry | |||
352 | 8675866 | Multiplicative splits to protect cipher keys | |||
353 | 8656179 | Using hidden secrets and token devices to create secure volumes | |||
354 | 8645281 | Process for authenticating an end user | |||
2013 | |||||
355 | 8615653 | Methods and systems for dynamic updates of digital certificates via subscription | |||
356 | 8615085 | Encrypted communication system with limited number of stored encryption key retrievals | |||
357 | 8605894 | Cryptographic process execution protecting an input value against attacks | |||
358 | 8594332 | Key generating apparatus, encrypting apparatus and decrypting appatatus | |||
359 | 8594322 | Encoding/decoding apparatus | |||
360 | 8589690 | Information processing apparatus, server apparatus, medium recording information processing program and information processing method | |||
361 | 8582765 | Masking of data in a calculation | |||
362 | 8582757 | Protection of a ciphering algorithm | |||
363 | 8577038 | Method and device for generating pseudorandom number, and method and device for encryption using pseudorandom number | |||
364 | 8577030 | Cryptographic processing system, key generation device, key delegation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program | |||
365 | 8571209 | Recording keys in a broadcast-encryption-based system | |||
366 | 8538013 | Rules-driven hash building | |||
367 | 8522318 | Enabling dynamic authentication with different protocols on the same port for a switch | |||
368 | 8522049 | Secure processor for extreme outdoor temperature conditions | |||
369 | 8520841 | Algorithms for generating parameters for genus 2 hyperelliptic curve cryptography | |||
370 | 8520839 | Data transmitter with a secure and efficient signature | |||
371 | 8515057 | Method and device for executing crytographic calculation | |||
372 | 8509426 | XZ-elliptic curve cryptography system and method | |||
373 | 8472629 | Communication system, communication device and processing method therefor | |||
374 | 8437473 | Small public-key based digital signatures for authentication | |||
375 | 8369523 | Surrogate key generation using cryptographic hashing | |||
2012 | |||||
376 | 8335313 | Encryption device, encryption method and storage medium storing its program | |||
377 | 8321353 | Method of providing transactions employing advertising based verification | |||
378 | 8296584 | Storage and retrieval of encrypted data blocks with in-line message authentication codes | |||
379 | 8295479 | Data conversion function processor | |||
380 | 8275126 | Apparatus and method for hash cryptography | |||
381 | 8259949 | Methods and apparatus for protecting digital content | |||
382 | 8259948 | Virtual TPM key migration using hardware keys | |||
383 | 8225110 | Cryptographic protection of usage restrictions in electronic devices | |||
384 | 8218762 | Encrypting apparatus for common key cipher | |||
385 | 8209546 | Data-securing method of program tool | |||
386 | 8208909 | System, apparatus and method for availing a mobile call of address information | |||
387 | 8205085 | Key update system, key management device, communication terminal, and key information construction method for multihop network | |||
388 | 8204225 | Method and apparatus for providing security in a radio frequency identification system | |||
389 | 8194854 | Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation | |||
390 | 8189779 | Quantum program concealing device and quantum program concealing method | |||
391 | 8180048 | Method and system for computational transformation | |||
392 | 8171282 | Encryption data integrity check with dual parallel encryption engines | |||
393 | 8165301 | Input-output device and storage controller handshake protocol using key exchange for data security | |||
394 | 8155308 | Advanced encryption system hardware architecture | |||
395 | 8150031 | Method and apparatus to perform redundant array of independent disks (RAID) operations | |||
396 | 8132242 | Automated authentication of software applications using a limited-use token | |||
397 | 8095805 | Security flash memory, data encryption device and method for accessing security flash memory | |||
2011 | |||||
398 | 8069476 | Identity validation | |||
399 | 8020006 | Pipeline for high-throughput encrypt functions | |||
400 | 7965844 | System and method for processing user data in an encryption pipeline | |||
401 | 7933404 | Primitives for fast secure hash functions and stream ciphers | |||
402 | 7933403 | ARIA encryption/decryption apparatus and method, and method of generating initialization key for the same | |||
403 | 7930562 | Method of and apparatus for reproducing information, and security module | |||
404 | 7907722 | Protection against power analysis attacks | |||
405 | 7864950 | Block encryption device using auxiliary conversion | |||
2010 | |||||
406 | 7860251 | Encryption-decryption circuit and method of operation | |||
407 | 7853015 | Group key exchanges with failures | |||
408 | 7822196 | Block cipher apparatus using auxiliary transformation | |||
409 | 7809946 | Secure authenticated channel | |||
410 | 7796752 | Cipher implementation | |||
411 | 7792303 | Method of delivering direct proof private keys to devices using a distribution CD | |||
412 | 7778420 | Content security layer providing long-term renewable security | |||
413 | 7769171 | Method for transmitting digital data in a local network | |||
414 | 7760874 | Method and system for implementing FI function in KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets | |||
415 | 7760871 | Block cipher using auxiliary transformation | |||
416 | 7760870 | Block cipher apparatus using auxiliary transformation | |||
417 | 7742599 | Apparatus and method for an iterative cryptographic block | |||
418 | 7702100 | Key generation for advanced encryption standard (AES) Decryption and the like | |||
419 | 7681031 | Method and apparatus to provide authentication code | |||
420 | 7672453 | Data encryption by nonlinear transfer function | |||
421 | 7664946 | System and method of guaranteed anonymity of cable television viewership behavior | |||
422 | 7664267 | Bit based arithmetic coding using variable size key cipher | |||
423 | 7653202 | Method and system for securing data utilizing redundant secure key storage | |||
424 | 7653196 | Apparatus and method for performing RC4 ciphering | |||
2009 | |||||
425 | 7640594 | Secure storage in a file system | |||
426 | 7639800 | Data conversion device and data conversion method | |||
427 | 7627768 | Method and device for automatic validation of computer program using cryptography functions | |||
428 | 7613295 | Cryptographic device and associated methods | |||
429 | 7539876 | Apparatus and method for generating a cryptographic key schedule in a microprocessor | |||
430 | 7536560 | Microprocessor apparatus and method for providing configurable cryptographic key size | |||
431 | 7519833 | Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine | |||
432 | 7512239 | Protection key for hardware and information management system | |||
433 | 7502943 | Microprocessor apparatus and method for providing configurable cryptographic block cipher round results | |||
434 | 7502463 | Methods and apparatus for implementing a cryptography engine | |||
435 | 7487367 | Apparatus and method for managing access to a memory | |||
436 | 7475249 | System and method for providing S/MIME-based document distribution via electronic mail mechanisms | |||
2008 | |||||
437 | 7471791 | Method for countermeasure in an electronic component using a secret key algorithm | |||
438 | 7421076 | Advanced encryption standard (AES) engine with real time S-box generation | |||
439 | 7412058 | Digital receiver and method for receiving secure group data | |||
440 | 7366300 | Methods and apparatus for implementing a cryptography engine | |||
441 | 7353540 | Information vending apparatus, information vending method, and program storage medium | |||
442 | 7340609 | Data transform method and apparatus, data processing method and apparatus, and program | |||
2007 | |||||
443 | 7305085 | Encryption apparatus and method, and decryption apparatus and method based on block encryption | |||
444 | 7295671 | Advanced encryption standard (AES) hardware cryptographic engine | |||
445 | 7283628 | Programmable data encryption engine | |||
446 | 7260218 | Configurable circuit with configuration data protection features | |||
447 | 7254231 | Encryption/decryption instruction set enhancement | |||
448 | 7215768 | Shared new data and swap signal for an encryption core | |||
449 | 7200232 | Method and apparatus for symmetric-key decryption | |||
450 | 7174015 | Methods and apparatus for variable radix scalable modular multiplication | |||
451 | 7158637 | Security communication packet processing apparatus and the method thereof | |||
2006 | |||||
452 | 7142675 | Sequence generator and method of generating a pseudo random sequence | |||
453 | 7099470 | Encryption apparatus using data encryption standard algorithm | |||
454 | 7076059 | Method and apparatus to implement the data encryption standard algorithm | |||
455 | 7068788 | Data encryption for suppression of data-related in-band harmonics in digital to analog converters | |||
456 | 7043017 | Key stream cipher device | |||
457 | 7006627 | Cipher block chaining mode in encryption/decryption processing | |||
458 | 6985582 | Encryption/decryption unit and storage medium | |||
2005 | |||||
459 | 6956951 | Extended key preparing apparatus, extended key preparing method, recording medium and computer program | |||
460 | 6950518 | Data encryption system | |||
461 | 6940975 | Encryption/decryption apparatus, encryption/decryption method, and program storage medium therefor | |||
462 | 6937727 | Circuit and method for implementing the advanced encryption standard block cipher algorithm in a system having a plurality of channels | |||
463 | 6931127 | Encryption device using data encryption standard algorithm | |||
464 | 6930621 | Method to overlay a secondary communication channel onto an encoded primary communication channel | |||
465 | 6922785 | Apparatus and a method for secure communications for network computers | |||
466 | 6917684 | Method of encryption and decryption with block number dependant key sets, each set having a different number of keys | |||
467 | 6914984 | Encryption apparatus using data encryption standard algorithm | |||
468 | 6911922 | Method to overlay a secondary communication channel onto an encoded primary communication channel | |||
469 | 6891951 | Cryptosystem-related method and apparatus | |||
470 | 6891950 | Extended key generator, encryption/decryption unit, extended key generation method, and storage medium | |||
471 | 6876744 | Methods and apparatus for enhanced CMEA including a CMEA iteration preceded and followed by transformations and employing an involuntary lookup | |||
472 | 6870929 | High throughput system for encryption and other data operations | |||
473 | 6865272 | Executing permutations | |||
474 | 6862354 | Stream cipher encryption method and apparatus that can efficiently seek to arbitrary locations in a key stream | |||
475 | 6859818 | Method and apparatus for permuting input data and recording medium having stored thereon a program for executing permutation | |||
476 | 6859154 | Method to overlay a secondary communication channel onto an encoded primary communication channel | |||
477 | 6850960 | Inverse calculation apparatus and recording medium having stored thereon a program for executing inverse calculation | |||
478 | 6845159 | Processing method and apparatus for converting information from a first format into a second format | |||
479 | 6839847 | Information processing equipment and IC card | |||
480 | 6839844 | Image encryption method and device | |||
2004 | |||||
481 | 6831979 | Cryptographic accelerator | |||
482 | 6829357 | Communication system having a transmitter and a receiver that engage in reduced size encrypted data communication | |||
483 | 6826691 | Arrangement for encryption/decryption of data and data carrier incorporating same | |||
484 | 6820814 | Countermeasure method in an electric component using a secret key cryptographic algorithm | |||
485 | 6819764 | Data processor, communication system and recording medium | |||
486 | 6816593 | Method and apparatus for transposing bits | |||
487 | 6813710 | Invisible electronic signature | |||
488 | 6813355 | Method and arrangement for ciphering information transfer | |||
489 | 6813354 | Mixing in small batches | |||
490 | 6804355 | Block cipher for small selectable block sizes | |||
491 | 6782473 | Network encryption system | |||
492 | 6772343 | Data processor, communication system and recording medium | |||
493 | 6769063 | Data converter and recording medium on which program for executing data conversion is recorded | |||
494 | 6768797 | Method and apparatus for encrypting data in a wireless communication system | |||
495 | 6760439 | Device for implementing a block-ciphering process | |||
496 | 6754190 | Channel selection method used in a communication system | |||
497 | 6751319 | Block cipher method | |||
498 | 6742115 | Method for negotiating weakened keys in encryption systems | |||
499 | 6732271 | Method of deciphering ciphered data and apparatus for same | |||
500 | 6731754 | Apparatus and method for maintaining and transmitting secret contents of a signal | |||
501 | 6698662 | Devices for hiding operations performed in a microprocesser card | |||
502 | 6683956 | Encrypting conversion apparatus, decrypting conversion apparatus, cryptographic communication system, and electronic toll collection apparatus | |||
2003 | |||||
503 | 6658569 | Secret key cryptographic process for protecting a computer system against attacks by physical analysis | |||
504 | 6654884 | Hardware-level mitigation and DPA countermeasures for cryptographic devices | |||
505 | 6636970 | Software encoding using a combination of two types of encoding and encoding type identification information | |||
506 | 6606385 | Data encrypting/decrypting conversion methods and apparatuses and data communication system adopting the same | |||
507 | 6587030 | Process for securing the privacy of data transmission | |||
508 | 6578150 | Block cipher method | |||
509 | 6578143 | Method for negotiating weakened keys in encryption systems | |||
510 | 6578061 | Method and apparatus for data permutation/division and recording medium with data permutation/division program recorded thereon | |||
511 | 6570989 | CRYPTOGRAPHIC PROCESSING APPARATUS, CRYPTOGRAPHIC PROCESSING METHOD, AND STORAGE MEDIUM STORING CRYPTOGRAPHIC PROCESSING PROGRAM FOR REALIZING HIGH-SPEED CRYPTOGRAPHIC PROCESSING WITHOUT IMPAIRING SECURITY | |||
512 | 6566858 | Circuit for protecting chips against IDD fluctuation attacks | |||
513 | 6553120 | Method for data decorrelation | |||
514 | 6542607 | Device and method for the cryptographic processing of a digital data stream presenting any number of data | |||
515 | 6526505 | DES encryption system | |||
516 | 6510518 | Balanced cryptographic computational method and apparatus for leak minimizational in smartcards and other cryptosystems | |||
517 | 6504931 | Method and apparatus for encrypting data | |||
518 | 6504930 | Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm | |||
2002 | |||||
519 | 6466669 | Cipher processor, IC card and cipher processing method | |||
520 | 6463150 | Encryption device for information in binary code | |||
521 | 6459792 | Block cipher using key data merged with an intermediate block generated from a previous block | |||
522 | 6434699 | Encryption processor with shared memory interconnect | |||
523 | 6424713 | Cryptographic system with concealed work factor | |||
524 | 6418224 | Methods and apparatus for self-inverting multiple-iteration CMEA crypto-processing for improved security for wireless telephone messages | |||
525 | 6415030 | Data transformation apparatus and data transformation method | |||
526 | 6408075 | Information processing equipment and IC card | |||
527 | 6385316 | Method and apparatus for encrypting data in a wireless communication system | |||
528 | 6377687 | Methods and apparatus for enhanced CMEA employing enhanced transformations | |||
529 | 6351539 | Cipher mixer with random number generator | |||
530 | 6347143 | Cryptographic device with encryption blocks connected parallel | |||
531 | 6345101 | Cryptographic method and apparatus for data communication and storage | |||
2001 | |||||
532 | 6327661 | Using unpredictable information to minimize leakage from smartcards and other cryptosystems | |||
533 | 6327654 | Semiconductor integrated circuit for cryptographic process and encryption algorithm alternating method | |||
534 | 6324288 | Cipher core in a content protection system | |||
535 | 6324286 | DES cipher processor for full duplex interleaving encryption/decryption service | |||
536 | 6320964 | Cryptographic accelerator | |||
537 | 6314186 | Block cipher algorithm having a robust security against differential cryptanalysis, linear cryptanalysis and higher-order differential cryptanalysis | |||
538 | 6304657 | Data encryption apparatus using odd number of shift-rotations and method | |||
539 | 6301362 | Method and apparatus for cryptographically transforming an input block into an output block | |||
540 | 6298136 | Cryptographic method and apparatus for non-linearly merging a data block and a key | |||
541 | 6295606 | Method and apparatus for preventing information leakage attacks on a microelectronic assembly | |||
542 | 6278783 | Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems | |||
543 | 6272221 | Encryption apparatus and computor-readable recording medium containing program for realizing the same | |||
544 | 6269164 | Method of and system for encrypting messages | |||
545 | 6269163 | Enhanced block ciphers with data-dependent rotations | |||
546 | 6266412 | Encrypting speech coder | |||
547 | 6266411 | Method and apparatus for multiple-iteration CMEA encryption and decryption for improved security for wireless telephone messages | |||
548 | 6259789 | Computer implemented secret object key block cipher encryption and digital signature device and method | |||
549 | 6249582 | Apparatus for and method of overhead reduction in a block cipher | |||
550 | 6246768 | Data encryption system for encrypting plaintext data | |||
551 | 6243470 | Method and apparatus for advanced symmetric key block cipher with variable length key and block | |||
552 | 6233337 | Methods and apparatus for enhanced security expansion of a secret key into a lookup table for improved security for wireless telephone messages | |||
553 | 6226382 | Method for implementing a private-key communication protocol between two processing devices | |||
554 | 6219420 | High assurance encryption system and method | |||
555 | 6201869 | Data transformation apparatus and data transformation method | |||
556 | 6199162 | Block cipher method | |||
557 | 6192129 | Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length key and block | |||
558 | 6189095 | Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks | |||
559 | 6185679 | Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks | |||
560 | 6185304 | Method and apparatus for a symmetric block cipher using multiple stages | |||
561 | 6182216 | Block cipher method | |||
562 | 6181252 | Remote control system and method having a system-specific code | |||
2000 | |||||
563 | 6167553 | Spiral scrambling | |||
564 | 6157720 | Method and apparatus for encrypting data | |||
565 | 6118870 | Microprocessor having instruction set extensions for decryption and multimedia applications | |||
566 | 6108421 | Method and apparatus for data encryption | |||
567 | 6108419 | Differential fault analysis hardening apparatus and evaluation method | |||
568 | 6088800 | Encryption processor with shared memory interconnect | |||
569 | 6075859 | Method and apparatus for encrypting data in a wireless communication system | |||
570 | 6065117 | Systems, methods and computer program products for sharing state information between a stateless server and a stateful client | |||
571 | 6058481 | Smart cards | |||
572 | 6035042 | High speed and method of providing high speed table generation for block encryption | |||
573 | 6031911 | Practical S box design | |||
574 | 6028939 | Data security system and method | |||
575 | 6014442 | Decrypting method and electronic device | |||
1999 | |||||
576 | 6005944 | System and method for constructing block ciphers | |||
577 | 5987124 | Method and apparatus for encrypting long blocks using a short-block encryption procedure | |||
578 | 5949884 | Design principles of the shade cipher | |||
579 | 5949883 | Encryption system for mixed-trust environments | |||
580 | 5930365 | Digital data shuffling/de-shuffling system | |||
581 | 5909494 | System and method for constructing a cryptographic pseudo random bit generator | |||
582 | 5893084 | Method for creating specific purpose rule-based n-bit virtual machines | |||
583 | 5870470 | Method and apparatus for encrypting long blocks using a short-block encryption procedure | |||
1998 | |||||
584 | 5852663 | Information signal transmission system | |||
585 | 5844925 | Spiral scrambling | |||
586 | 5838796 | Statistically optimized bit permutations in interated block substitution systems | |||
587 | 5838795 | Method and apparatus for statistical diffusion in iterated block substitution | |||
588 | 5838794 | Method and apparatus for inter-round mixing in iterated block substitution systems | |||
589 | 5835600 | Block encryption algorithm with data-dependent rotations | |||
590 | 5835599 | Muti-cycle non-parallel data encryption engine | |||
591 | 5832083 | Method and device for utilizing data content | |||
592 | 5825886 | Construction symmetric ciphers using the cast design procedure | |||
593 | 5818940 | Switching matrix | |||
594 | 5799089 | System and apparatus for blockwise encryption/decryption of data | |||
595 | 5796837 | Apparatus and method for generating a secure substitution-box immune to cryptanalyses | |||
596 | 5796836 | Scalable key agile cryptography | |||
597 | 5793940 | Data processing apparatus | |||
598 | 5778074 | Methods for generating variable S-boxes from arbitrary keys of arbitrary length including methods which allow rapid key changes | |||
599 | 5768390 | Cryptographic system with masking | |||
600 | 5751810 | Bit agitator | |||
601 | 5745577 | Symmetric cryptographic system for data encryption | |||
602 | 5740251 | Data processing apparatus | |||
603 | 5740249 | Encryption apparatus and method capable of controlling encryption process in accordance with an internal state | |||
604 | 5734721 | Anti-spoof without error extension (ANSWER) | |||
605 | 5727062 | Variable size block ciphers | |||
606 | 5724428 | Block encryption algorithm with data-dependent rotations | |||
607 | 5724427 | Method and apparatus for autokey rotor encryption | |||
1997 | |||||
608 | 5696823 | High-bandwidth encryption system with low-bandwidth cryptographic modules | |||
609 | 5687238 | Small size product cipher apparatus | |||
610 | 5684876 | Apparatus and method for cipher stealing when encrypting MPEG transport packets | |||
611 | 5682425 | Information signal transmission system | |||
612 | 5675653 | Method and apparatus for digital encryption | |||
613 | 5673319 | Block cipher mode of operation for secure, length-preserving encryption | |||
614 | 5671284 | Data encryptor having a scalable clock | |||
615 | 5652796 | Data encryption control system | |||
616 | 5647001 | Nonlinear dynamic substitution devices and methods for block substitutions employing coset decompositions and direct geometric generation | |||
617 | 5640455 | Secret-key enciphering method and arrangement therefor capable of preventing unfair acquirement of information | |||
618 | 5631960 | Autotest of encryption algorithms in embedded secure encryption devices | |||
619 | 5623549 | Cipher mechanisms with fencing and balanced block mixing | |||
620 | 5623548 | Transformation pattern generating device and encryption function device | |||
621 | 5606616 | Cryptographic apparatus with double feedforward hash function | |||
622 | 5600726 | Method for creating specific purpose rule-based n-bit virtual machines | |||
623 | 5594797 | Variable security level encryption | |||
1996 | |||||
624 | 5539827 | Device and method for data encryption | |||
625 | 5533128 | Pseudo-random transposition cipher system and method | |||
626 | 5517614 | Data compression/encryption processing apparatus | |||
627 | 5511123 | Symmetric cryptographic system for data encryption | |||
628 | 5488661 | Data communication system and method with data scrambling | |||
1995 | |||||
629 | 5473693 | Apparatus for avoiding complementarity in an encryption algorithm | |||
630 | 5452358 | Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing a data dependent encryption function | |||
631 | 5442705 | Hardware arrangement for enciphering bit blocks while renewing a key at each iteration | |||
632 | 5432848 | DES encryption and decryption unit with error checking | |||
633 | 5412729 | Device and method for data encryption | |||
634 | 5412728 | Device for security protection of digital data using elementary instructions data processing | |||
635 | 5381480 | System for translating encrypted data | |||
1994 | |||||
636 | 5365589 | Method and apparatus for encryption, decryption and authentication using dynamical systems | |||
637 | 5365588 | High speed encryption system and method | |||
638 | 5363449 | Personal identification encryptor and method | |||
639 | 5351299 | Apparatus and method for data encryption with block selection keys and data encryption keys | |||
640 | 5335280 | Random sum cipher system and method | |||
641 | 5323464 | Commercial data masking | |||
642 | 5317639 | Non-linear block substitution devices derived by constructive corruption | |||
643 | 5317638 | Performance enhancement for ANSI X3.92 data encryption algorithm standard | |||
644 | 5301235 | Arrangement for transforming plaintext into ciphertext for use in a data communications system | |||
645 | 5297208 | Secure file transfer system and method | |||
646 | 5289542 | Caller identification system with encryption | |||
1993 | |||||
647 | 5261003 | Data communication system and method with data scrambling | |||
648 | 5239584 | Method and apparatus for encryption/authentication of data in energy metering applications | |||
649 | 5231662 | Method and device for enciphering data to be transferred and for deciphering the enciphered data, and a computer system comprising such a device | |||
650 | 5222139 | Cryptographic method and apparatus | |||
651 | 5214704 | Nonlinear dynamic substitution devices and methods for block substitutions | |||
652 | 5214703 | Device for the conversion of a digital block and use of same | |||
653 | 5214701 | Method of processing data by compression and permutation for microcircuit cards | |||
654 | 5195136 | Method and apparatus for data encryption or decryption | |||
1992 | |||||
655 | 5168523 | Method of rotating a word constituted by binary elements and arrangement in which the said method is carried out | |||
656 | 5168521 | Method of executing an irregular permutation of data protected by encryption | |||
657 | 5103479 | Encipher method and decipher method | |||
1991 | |||||
658 | 5073935 | Method for secure communication | |||
659 | 5063596 | Encryption printed circuit board | |||
660 | 5058163 | Interface unit for transferring digital data between time-domain multiplexed communication links | |||
661 | 5054067 | Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator | |||
662 | 5038376 | Block substitution based encryption by a modulo 2 addition method and apparatus | |||
663 | 5008935 | Efficient method for encrypting superblocks of data | |||
664 | 5007083 | Secure computer | |||
665 | 5003597 | Method and apparatus for data encryption | |||
666 | 5003596 | Method of cryptographically transforming electronic digital data from one form to another | |||
667 | 4982429 | Encipher method and decipher method | |||
1990 | |||||
668 | 4979832 | Dynamic substitution combiner and extractor | |||
669 | 4937574 | Data conversion | |||
670 | 4914697 | Cryptographic method and apparatus with electronically redefinable algorithm | |||
671 | 4910776 | Encryption printed circuit board | |||
672 | 4907275 | Encryption apparatus | |||
1989 | |||||
673 | 4850019 | Data randomization equipment | |||
674 | 4797928 | Encryption printed circuit board | |||
1988 | |||||
675 | 4776011 | Recursive key schedule cryptographic system | |||
676 | 4751733 | Substitution permutation enciphering device | |||
677 | 4731843 | Method and device of increasing the execution speed of cipher feedback mode of the DES by an arbitrary multiplier | |||
1987 | |||||
678 | 4668103 | Polygraphic encryption-decryption communications system | |||
679 | 4645871 | Non-interfering in-band protocol-independent diagnostic scanning in a digital multipoint communication system | |||
1985 | |||||
680 | 4533948 | CATV Communication system | |||
681 | 4520232 | Polygraphic encryption-decryption system | |||
1982 | |||||
682 | 4322577 | Cryptosystem | |||
1981 | |||||
683 | 4275265 | Complete substitution permutation enciphering and deciphering circuit | |||
684 | 4262358 | DES Parity check system | |||
685 | 4255811 | Key controlled block cipher cryptographic system | |||
1980 | |||||
686 | 4229818 | Method and apparatus for enciphering blocks which succeed short blocks in a key-controlled block-cipher cryptographic system | |||
687 | 4195200 | Key controlled block-cipher cryptographic system employing a multidirectional shift matrix | |||
1979 | |||||
688 | 4177355 | Array device for data scrambling | |||
689 | 4157454 | Method and system for machine enciphering and deciphering | |||
1978 | |||||
690 | 4078152 | Block-cipher cryptographic system with chaining | |||
691 | 4074066 | Message verification and transmission error detection by block chaining | |||
1976 | |||||
692 | 3962539 | Product block cipher system for data security | |||
693 | 3958081 | Block cipher system for data security | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |