СПИСОК патентов США - подгруппа МПК16 H04L9/06



Выделить слова в названиях патентов:


№ п/п Номер патента Название патента

2017

19608819Learning parity with noise-based relational encryption for proximity relations
29608817Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
39608812Common secret key generation device, encryption device, decryption device, common secret key generation method, encryption method, decryption method, and program
49608803Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption
59608802Decoy bits method for direct encryption and key generation
69602479Encryption based on network information
79602281Parallelizable cipher construction
89602280System and method for content encryption in a key/value store
99602273Implementing key scheduling for white-box DES implementation
109602095Multiplexer circuit, computer-readable recording medium having stored therein program for designing multiplexer circuit, and apparatus for designing multiplexer circuit
119600421Systems and methods for low-latency encrypted storage
129600238Fully digital chaotic differential equation-based systems and methods
139596598Reducing detectability of an encryption key
149596081Order preserving tokenization
159596079Secure telecommunications
169596075Transparent serial encryption
179594580Secure storage and accelerated transmission of information over communication networks
189590955Methods and systems for providing information relating to an event
199590951One-time pad communications network
209589151Techniques and architecture for anonymizing user data
219588705Efficient elimination of access to data on a writable storage media
229584495Method and system for establishing secure communications using composite key cryptography
239584488Data encryption cipher using rotating ports
249584323Compressing encrypted data without the encryption key
259584315Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof
269584313Streaming one time pad cipher using rotating ports for data encryption
279584312Methods and systems for storing and retrieving data
289584310Protecting a white-box implementation against attacks
299583704Complementary resistance switch, contact-connected polycrystalline piezo- or ferroelectric thin-film layer, method for encrypting a bit sequence
309577996Computer system and method for encrypted remote storage
319577992Data encryption/decryption using neuro and neuro-mechanical fingerprints
329577822Secure bitstream authentication
339576133Detection of data tampering of encrypted data
349571281CRT-RSA encryption method and apparatus
359571270Construction and uses of variable-input-length tweakable ciphers
369571269Encryption device, encryption method and program
379571268Method and system for homomorphicly randomizing an input
389569639Remapping constant points in a white-box implementation
399569623Secure boot with resistance to differential power analysis and other external monitoring attacks
409569210Apparatus and method of execution unit for calculating multiple rounds of a skein hashing algorithm
419565472Apparatus and methods for content transfer protection
429565018Protecting cryptographic operations using conjugacy class functions
439563769System and method for secure loading data in a cache memory
449560040Mitigating risk of account enumeration
459559844Non-linear processor, stream-cipher encrypting device, stream-cipher decrypting device, mask processing method, stream-cipher encrypting method, stream-cipher decrypting method, and program
469559838Method of processing data protected against fault injection attacks and associated device
479559837Methods for cryptographic delegation and enforcement of dynamic access to stored data
489558374Methods and systems for securing stored information
499553721Secure execution environment communication
509553719Transmitting terminal, receiving terminal, ID numbering device, and key transmission method
519552494Protected indexing and querying of large sets of textual data
529552191Secure random number generation
539548737Method for manufacturing a digital circuit and digital circuit
549547777Validating compressed archive keys
559544277KAFKA: A cellular automation / complex Fibonacci sequences-based technique for encrypting and decrypting audio, video and text messages
569544139Method and apparatus for a non-deterministic random bit generator (NRBG)
579544133On-the-fly key generation for encryption and decryption
589544131Efficient modular addition resistant to side channel attacks
599542561Instructions processors, methods, and systems to process secure hash algorithms
609542158T-sequence apparatus and method for general deterministic polynomial-time primality testing and composite factoring
619537652Polymorphic encryption key allocation scheme
629537651Information processing apparatus, information processing method, and program

2016

639531916Preventing pattern recognition in electronic code book encryption
649531531Methods and devices for fixed execution flow multiplier recoding and scalar multiplication
659525546Cryptographic operation by applying sub-keys to multiplication units in accordance with galois-field arithmetic
669525435Computing device storing look-up tables for computation of a function
679521203Communication session processing
689520992Logical-to-physical address translation for a removable data storage device
699515821Apparatus and method for data encryption
709515820Protection against side channels
719515819Pluggable cryptography
729515818Multi-block cryptographic operation
739515675Interface circuit operating to recover error of transmitted data
749514330Meta-complete data storage
759509665Protecting against malicious modification in cryptographic operations
769509508Generating a session key for authentication and secure data transfer
779509495Data protection method and apparatus
789509414Encryption and decryption method and device
799503435Load balancing hash computation for network switches
809503434Single-pass data compression and encryption
819503255Cryptographic sequencing system and method
829497175Iterative data secret-sharing transformation
839497021Device for generating a message authentication code for authenticating a message
849494645Method for testing cryptographic circuits, secured cryptographic circuit capable of being tested, and method for wiring such circuit
859491389Focal plane array processing method and apparatus
869490971Instruction for fast ZUC algorithm processing
879490970Methods and system for secure communication between an RFID tag and a reader
889489521Format preserving encryption methods for data strings with constraints
899489508Device functionality access control using unique device credentials
909485222Data stream traffic control
919485088Systems and methods for dynamic data masking
929485087Method and circuit for cryptographic operation
939483656Efficient and secure data storage utilizing a dispersed data storage system
949479616Systems and methods for transformation of logical data objects for storage
959479327Apparatus and method for generating key
969477839Methods for centralized privacy-preserving collaborative threat mitigation
979477830Controlled and client-side authentication module
989473296Instruction and logic for a simon block cipher
999473176Implementation of log and inverse operation in a Galois Field
1009467286Encryption device, decryption device, encryption method, decryption method, and program
1019467279Instructions and logic to provide SIMD SM4 cryptographic block cipher functionality
1029465961Methods and circuits for securing proprietary memory transactions
1039465582Significant random number generator
1049461818Method for encrypting a program for subsequent execution by a microprocessor configured to decrypt and execute the encrypted program
1059461816Methods, systems and apparatus to reduce processor demands during encryption
1069461815Virtualized AES computational engine
1079460315Order-preserving encryption system, device, method, and program
1089460312Data integrity protection from rollback attacks for use with systems employing message authentication code tags
1099459833System and method with specific ordered execution over physical elements
1109455967Load balancing hash computation for network switches
1119455966Load balancing hash computation for network switches
1129455962Protecting memory interface
1139455833Behavioral fingerprint in a white-box implementation
1149454494Encrypting a communication from a device
1159450749One-time-pad encryption with central key service
1169450748Decryption of content including partial-block discard
1179449179Information processor
1189445265Method and device for processing SRVCC switching, and terminal
1199444619Generation of randomized messages for cryptographic hash functions
1209444495System and method of interfacing co-processors and input/output devices via a main memory system
1219443091Method and system for protecting execution of cryptographic hash functions
1229443066Decrypting content samples including distinct encryption chains
1239442890Distribution apparatus, restoration apparatus, distribution method, restoration method, and distribution and restoration system
1249438416Customizable encryption algorithm based on a sponge construction with authenticated and non-authenticated modes of operation
1259438414Virtualized SHA computational engine
1269438413Generating and merging keys for grouping and differentiating volumes of files
1279432187Data scrambling initialization
1289432181Device, method, and program for format-preserving encryption, and device, method, and program for decryption
1299432180Method and system for a programmable parallel computation and data manipulation accelerator
1309430650Method for managing memory space in a secure non-volatile memory of a secure element
1319426659Service activation using algorithmically defined key
1329425961Method for performing an encryption of an AES type, and corresponding system and computer program product
1339425954Device and method for resonant cryptography
1349425953Generating multiple secure hashes from a single data buffer
1359425952Algebraic manipulation detection codes from algebraic curves
1369420008Method for repurposing of communications cryptographic capabilities
1379419952Memory encryption method compatible with a memory interleaved system and corresponding system
1389419792Instruction for accelerating SNOW 3G wireless security algorithm
1399419791Hash value calculation device, hash value calculation method, and non-transitory computer-readable storage medium including computer executable instruction
1409418246Decryption systems and related methods for on-the-fly decryption within integrated circuits
1419418245Encryption processing device, encryption processing method, and program
1429417951Method and apparatus for cipher fault detection
1439408079Apparatus and method for communication security in a nationwide wireless network using wireless routers
1449407437Secure initialization vector generation
1459405919Dynamic encryption keys for use with XTS encryption systems employing reduced-round ciphers
1469405537Apparatus and method of execution unit for calculating multiple rounds of a skein hashing algorithm
1479401804Leakage resilient garbled circuit generation using reduced memory hardware token
1489401803Flexible scrambler/descrambler architecture for a transceiver
1499397753Pluggable transceiver module with enhanced circuitry
1509396340Method for encrypting a 3D model file and system thereof
1519396136Cascaded data encryption dependent on attributes of physical memory
1529391770Method of cryption
1539390292Encrypted digital circuit description allowing circuit simulation
1549389855Arithmetic device
1559385954Hashing techniques for use in a network environment
1569384484Secure content distribution system
1579379887Efficient cryptographic key stream generation using optimized S-box configurations
1589374219Method and apparatus for securing access to an integrated circuit
1599374218Method for conducting data encryption and decryption using symmetric cryptography algorithm and table look-up device
1609369274Cipher text translation
1619367693Bitstream confirmation for configuration of a programmable logic device
1629367690Encryption and decryption methods applied on operating system
1639363078Method and apparatus for hardware-accelerated encryption/decryption
1649363074Encryption processing apparatus, encryption processing method, and computer program
1659363073Cryptographic countermeasure method by deriving a secret data
1669363034Method to encrypt information that is transferred between two communication units
1679361617Variable-length cipher system and method
1689357432Media streaming with high rate availability
1699356860Managing external communications for provided computer networks
1709355374Systems and methods for creating fingerprints of encryption devices
1719350544Apparatus for encrypting data
1729350539Secure distribution of content
1739350534Method and apparatus for pipelined byte substitution in encryption and decryption
1749344278Secure data transfer using random ordering and random block sizing
1759344277Mass serialization analytics
1769344274Method and system for encrypting data
1779342712Method and system for accelerating cryptographic processing
1789342709Pattern detection
1799336160Low latency block cipher
1809331848Differential power analysis resistant encryption and decryption functions
1819326142Cryptographic key generation
1829325642Randomness for encryption operations
1839325498Performing AES encryption or decryption in multiple modes with a single instruction
1849319878Streaming alignment of key stream to unaligned data stream
1859317719SM3 hash algorithm acceleration processors, methods, systems, and instructions
1869317462Microcontroller peripheral data transfer redirection for resource sharing
1879317451Nonvolatile semiconductor storage device having encrypting arithmetic device
1889317286Apparatus and method for implementing instruction support for the camellia cipher algorithm
1899313248Method and apparatus for delivering encoded content
1909313023Format-preserving cipher
1919311459Application-driven playback of offline encrypted content with unaware DRM module
1929305184Packet-processing scheduler, security context, authentication, packet header, air cipher subsystem
1939304941Self-encrypting flash drive
1949298947Method for protecting the integrity of a fixed-length data structure
1959298941Secure data copying
1969294916Methods and apparatuses generating a radio base station key in a cellular radio system
1979294268System and method for variable length encryption
1989294266Method and apparatus to encrypt plaintext data
1999292707System and method for cascading token generation and data de-identification
2009288041Apparatus and method for performing compression operation in hash algorithm
2019288040Encryption device
2029286454Method of identifying a user by means of modified biometric characteristics, and a database for implementing the method
2039282082Compressing encrypted data without the encryption key
2049281940Information processing apparatus, information processing method, and program
2059276911Secure and scalable mapping of human sequencing reads on hybrid clouds
2069276745Preserving image privacy when manipulated by cloud services
2079271256Verifying generic broadcast of location assistance data
2089270462Method and system for conducting high speed, symmetric stream cipher encryption
2099270458Encryption processing device, encryption processing method, and program
2109270456System and methodology for decrypting encrypted media
2119270445Solid state disk and input/output method
2129268918Encryption and decryption of a dataset in at least two dimensions
2139264404Encrypting data using time stamps
2149264234Secure authentication of identification for computing devices
2159264222Precomputing internal AES states in counter mode to protect keys used in AES computations
2169264221Systems and methods for faster public key encryption using the associated private key portion
2179252953Instruction for performing a pseudorandom number generate operation
2189252945Method for recognizing a manipulation of a sensor and/or sensor data of the sensor
2199252944Key wrapping for common cryptographic architecture (CCA) key token
2209252943Parallelizable cipher construction
2219252756Random number generating device
2229251377Instructions processors, methods, and systems to process secure hash algorithms
2239251374Instructions to perform JH cryptographic hashing
2249246890PGP encrypted data transfer
2259246672Two indices moving in opposite directions for cryptographic bidirectional communications using a shared master key
2269245148Secure storage and accelerated transmission of information over communication networks
2279240885Cryptographic processing apparatus, cryptographic processing method, and computer program therefor
2289237441Method and apparatus for configuring signaling radio bearer in a wireless communications system
2299237014Partial CipherText updates using variable-length segments delineated by pattern matching and encrypted by fixed-length blocks
2309237008Encryption device, encryption method, and encryption program
2319237007Secure modulation and demodulation
2329237006Table-connected tokenization
2339235712Securing external memory data
2349232390Methods and apparatuses generating a radio base station key in a cellular radio system
2359230120Architecture and instruction set for implementing advanced encryption standard (AES)

2015

2369225717Event-based data signing via time-based one-time authentication passcodes
2379225708Method for authenticated encryption and decryption
2389225525Identity management certificate operations
2399225521Apparatus and method for skein hashing
2409223824Systems and methods for scrubbing confidential insurance account data
2419219606Method and device for digital data blocks encryption and decryption
2429218297Systems and methods for transformation of logical data objects for storage
2439218158N-valued shift registers with inverter reduced feedback logic functions
2449215219Method for protecting data used in cloud computing with homomorphic encryption
2459213696Methods and systems for securely accessing translation resource manager
2469210133Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
2479209967Precalculated encryption key
2489208357FPGA configuration bitstream protection using multiple keys
2499208333Secure data recorder
2509203811Authenticated encryption support in ISO/IEC 23009-4
2519203609Method and apparatus for implementing key stream hierarchy
2529197412Low-complexity electronic circuit protected by customized masking
2539191211Data security system
2549191198Method and device using one-time pad data
2559191197AES encryption/decryption circuit
2569189425Protecting look up tables by mixing code and operations
2579184916System and method for using a streaming protocol
2589182967Method for safely downloading application
2599178699Public key encryption algorithms for hard lock file encryption
2609178694Securing backing storage data passed through a network
2619172533Method and system for securing communication
2629171136Data protection method and device
2639166793Efficient authentication for mobile and pervasive computing
2649166789Cryptographic processing apparatus
2659160974Systems and methods for transcoding and place shifting media content
2669160734Service activation using algorithmically defined key
2679160698Methods and systems for providing information relating to an event
2689160525Apparatus and method for key update for use in a block cipher algorithm
2699160524Method and system for recovering cryptographic operations and/or secrets
2709160523Apparatus and method to prevent side channel power attacks in advanced encryption standard
2719158931Block encryption method and block decryption method having integrity verification
2729154295Method of generating a correspondence table for a cryptographic white box
2739152805Security device
2749152801Cryptographic system of symmetric-key encryption using large permutation vector keys
2759152579Meta-complete data storage
2769147090Mesh grid protection system
2779143326Method and system for encrypting data
2789143317Protecting against white box attacks using column rotation
2799143027Intelligent power supervisor
2809141831Scheduler, security context cache, packet processor, and authentication, encryption modules
2819137304Method and apparatus for achieving data security in a distributed cloud computing environment
2829137178Tracking packets through a cloud computing environment
2839137013Method and system for a hardware-efficient universal hash function
2849137011Rapid data encryption and decryption for secure communication over open channels with plausible deniability
2859135834Apparatus and method to prevent side channel power attacks in advanced encryption standard using floating point operation
2869135450Systems and methods for protecting symmetric encryption keys
2879130909Data management apparatus, power usage calculation system, and data management method
2889130739Method and apparatus for nonlinear IV setup in keystream generators
2899129671Semiconductor device identifier generation method and semiconductor device
2909124420Encryption processing device and encryption processing method
2919124418Method and system for encryption of blocks of data
2929124417Computation of garbled tables in garbled circuit
2939122882Method and apparatus of securely processing data for file backup, de-duplication, and restoration
2949119167Generic broadcast of location assistance data
2959118481Method and system for efficiently generating a high quality pseudo-random sequence of numbers with extraordinarily long periodicity
2969112886Method and system for providing centralized data field encryption, and distributed storage and retrieval
2979111122Asymmetric cryptographic device with local private key generation and method therefor
2989104842Data protection method and device
2999104610Method, system and medium for analog encryption in a flash memory
3009104400Cryptographic support instructions
3019100184Instructions processors, methods, and systems to process BLAKE secure hashing algorithm
3029100183Computer program product and method for order preserving symbol based encryption
3039100170File packing and unpacking method, and device thereof
3049098712Encrypting operating system
3059094195Protecting de-duplication repositories against a malicious attack
3069092644Method and system for protecting memory information in a platform
3079088805Encrypted memory device and methods for use therewith
3089087187Unique credentials verification
3099083528Authentication of encrypted data blocks
3109083507Data processing device, data processing method, and program
3119083506Cryptographic processing apparatus and cryptographic processing method, and computer program
3129083489Block encryption method and apparatus
3139077526Method and system for ensuring sequential playback of digital media
3149076164Method and apparatus for performing targeted advertising in documents
3159071420Information processing apparatus, tampering detection apparatus, information processing method, tampering detection method, and computer product
3169071416Galois/counter mode encryption in a wireless network
3179071408Communication system
3189069988Detecting key corruption
3199066117Container agnostic encryption device and methods for use therewith
3209065654Parallel encryption/decryption
3219065642Intercepting key sessions
3229065632Message authentication using a universal hash function computed with carryless multiplication
3239065631Integrated cryptographic module providing confidentiality and integrity
3249059866Digital microwave radio system and method with encryption
3259059851Method and computer program product for order preserving symbol based encryption
3269059838Encryption algorithm with randomized buffer
3279054871Physical key-protected one time pad
3289054870Information security based on eigendecomposition
3299054857Parallelizeable integrity-aware encryption technique
3309053300Device and a method for generating software code
3319025766Efficient hardware architecture for a S1 S-box in a ZUC cipher
3329021268Method, computer system, and computer program product for password generation
3339008313System and method for generating random key stream cipher texts
3349002014On-die cryptographic apparatus in a secure microprocessor
3358983063Method and system for high throughput blockwise independent encryption/decryption
3368958550Encryption operation with real data rounds, dummy data rounds, and delay periods
3378930694Method for the generation of a code, and method and system for the authorization of an operation
3388929542Cryptographic processing system, key generation device, key delegation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program

2014

3398861720Tamper-resistant memory integrated circuit and encryption circuit using same
3408824677Provably secure and efficient pseudorandom number generation
3418804952System and method for securing scalar multiplication against differential power attacks
3428799664Small public-key based digital signatures for authentication
3438774402Encryption/decryption apparatus and method using AES rijndael algorithm
3448767965Method for a public-key infrastructure providing communication integrity and anonymity while detecting malicious communication
3458767954Methods and systems for deriving a cryptographic framework
3468745726Identity verification in virtual worlds using encoded data
3478732485Methods for process key rollover/re-encryption and systems thereof
3488731189Information processing device, information processing method
3498712057Apparatus and method for an iterative cryptographic block
3508707033Information processing apparatus and information processing method
3518693681Kasumi cipher executable instructions and circuitry
3528675866Multiplicative splits to protect cipher keys
3538656179Using hidden secrets and token devices to create secure volumes
3548645281Process for authenticating an end user

2013

3558615653Methods and systems for dynamic updates of digital certificates via subscription
3568615085Encrypted communication system with limited number of stored encryption key retrievals
3578605894Cryptographic process execution protecting an input value against attacks
3588594332Key generating apparatus, encrypting apparatus and decrypting appatatus
3598594322Encoding/decoding apparatus
3608589690Information processing apparatus, server apparatus, medium recording information processing program and information processing method
3618582765Masking of data in a calculation
3628582757Protection of a ciphering algorithm
3638577038Method and device for generating pseudorandom number, and method and device for encryption using pseudorandom number
3648577030Cryptographic processing system, key generation device, key delegation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program
3658571209Recording keys in a broadcast-encryption-based system
3668538013Rules-driven hash building
3678522318Enabling dynamic authentication with different protocols on the same port for a switch
3688522049Secure processor for extreme outdoor temperature conditions
3698520841Algorithms for generating parameters for genus 2 hyperelliptic curve cryptography
3708520839Data transmitter with a secure and efficient signature
3718515057Method and device for executing crytographic calculation
3728509426XZ-elliptic curve cryptography system and method
3738472629Communication system, communication device and processing method therefor
3748437473Small public-key based digital signatures for authentication
3758369523Surrogate key generation using cryptographic hashing

2012

3768335313Encryption device, encryption method and storage medium storing its program
3778321353Method of providing transactions employing advertising based verification
3788296584Storage and retrieval of encrypted data blocks with in-line message authentication codes
3798295479Data conversion function processor
3808275126Apparatus and method for hash cryptography
3818259949Methods and apparatus for protecting digital content
3828259948Virtual TPM key migration using hardware keys
3838225110Cryptographic protection of usage restrictions in electronic devices
3848218762Encrypting apparatus for common key cipher
3858209546Data-securing method of program tool
3868208909System, apparatus and method for availing a mobile call of address information
3878205085Key update system, key management device, communication terminal, and key information construction method for multihop network
3888204225Method and apparatus for providing security in a radio frequency identification system
3898194854Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation
3908189779Quantum program concealing device and quantum program concealing method
3918180048Method and system for computational transformation
3928171282Encryption data integrity check with dual parallel encryption engines
3938165301Input-output device and storage controller handshake protocol using key exchange for data security
3948155308Advanced encryption system hardware architecture
3958150031Method and apparatus to perform redundant array of independent disks (RAID) operations
3968132242Automated authentication of software applications using a limited-use token
3978095805Security flash memory, data encryption device and method for accessing security flash memory

2011

3988069476Identity validation
3998020006Pipeline for high-throughput encrypt functions
4007965844System and method for processing user data in an encryption pipeline
4017933404Primitives for fast secure hash functions and stream ciphers
4027933403ARIA encryption/decryption apparatus and method, and method of generating initialization key for the same
4037930562Method of and apparatus for reproducing information, and security module
4047907722Protection against power analysis attacks
4057864950Block encryption device using auxiliary conversion

2010

4067860251Encryption-decryption circuit and method of operation
4077853015Group key exchanges with failures
4087822196Block cipher apparatus using auxiliary transformation
4097809946Secure authenticated channel
4107796752Cipher implementation
4117792303Method of delivering direct proof private keys to devices using a distribution CD
4127778420Content security layer providing long-term renewable security
4137769171Method for transmitting digital data in a local network
4147760874Method and system for implementing FI function in KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets
4157760871Block cipher using auxiliary transformation
4167760870Block cipher apparatus using auxiliary transformation
4177742599Apparatus and method for an iterative cryptographic block
4187702100Key generation for advanced encryption standard (AES) Decryption and the like
4197681031Method and apparatus to provide authentication code
4207672453Data encryption by nonlinear transfer function
4217664946System and method of guaranteed anonymity of cable television viewership behavior
4227664267Bit based arithmetic coding using variable size key cipher
4237653202Method and system for securing data utilizing redundant secure key storage
4247653196Apparatus and method for performing RC4 ciphering

2009

4257640594Secure storage in a file system
4267639800Data conversion device and data conversion method
4277627768Method and device for automatic validation of computer program using cryptography functions
4287613295Cryptographic device and associated methods
4297539876Apparatus and method for generating a cryptographic key schedule in a microprocessor
4307536560Microprocessor apparatus and method for providing configurable cryptographic key size
4317519833Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine
4327512239Protection key for hardware and information management system
4337502943Microprocessor apparatus and method for providing configurable cryptographic block cipher round results
4347502463Methods and apparatus for implementing a cryptography engine
4357487367Apparatus and method for managing access to a memory
4367475249System and method for providing S/MIME-based document distribution via electronic mail mechanisms

2008

4377471791Method for countermeasure in an electronic component using a secret key algorithm
4387421076Advanced encryption standard (AES) engine with real time S-box generation
4397412058Digital receiver and method for receiving secure group data
4407366300Methods and apparatus for implementing a cryptography engine
4417353540Information vending apparatus, information vending method, and program storage medium
4427340609Data transform method and apparatus, data processing method and apparatus, and program

2007

4437305085Encryption apparatus and method, and decryption apparatus and method based on block encryption
4447295671Advanced encryption standard (AES) hardware cryptographic engine
4457283628Programmable data encryption engine
4467260218Configurable circuit with configuration data protection features
4477254231Encryption/decryption instruction set enhancement
4487215768Shared new data and swap signal for an encryption core
4497200232Method and apparatus for symmetric-key decryption
4507174015Methods and apparatus for variable radix scalable modular multiplication
4517158637Security communication packet processing apparatus and the method thereof

2006

4527142675Sequence generator and method of generating a pseudo random sequence
4537099470Encryption apparatus using data encryption standard algorithm
4547076059Method and apparatus to implement the data encryption standard algorithm
4557068788Data encryption for suppression of data-related in-band harmonics in digital to analog converters
4567043017Key stream cipher device
4577006627Cipher block chaining mode in encryption/decryption processing
4586985582Encryption/decryption unit and storage medium

2005

4596956951Extended key preparing apparatus, extended key preparing method, recording medium and computer program
4606950518Data encryption system
4616940975Encryption/decryption apparatus, encryption/decryption method, and program storage medium therefor
4626937727Circuit and method for implementing the advanced encryption standard block cipher algorithm in a system having a plurality of channels
4636931127Encryption device using data encryption standard algorithm
4646930621Method to overlay a secondary communication channel onto an encoded primary communication channel
4656922785Apparatus and a method for secure communications for network computers
4666917684Method of encryption and decryption with block number dependant key sets, each set having a different number of keys
4676914984Encryption apparatus using data encryption standard algorithm
4686911922Method to overlay a secondary communication channel onto an encoded primary communication channel
4696891951Cryptosystem-related method and apparatus
4706891950Extended key generator, encryption/decryption unit, extended key generation method, and storage medium
4716876744Methods and apparatus for enhanced CMEA including a CMEA iteration preceded and followed by transformations and employing an involuntary lookup
4726870929High throughput system for encryption and other data operations
4736865272Executing permutations
4746862354Stream cipher encryption method and apparatus that can efficiently seek to arbitrary locations in a key stream
4756859818Method and apparatus for permuting input data and recording medium having stored thereon a program for executing permutation
4766859154Method to overlay a secondary communication channel onto an encoded primary communication channel
4776850960Inverse calculation apparatus and recording medium having stored thereon a program for executing inverse calculation
4786845159Processing method and apparatus for converting information from a first format into a second format
4796839847Information processing equipment and IC card
4806839844Image encryption method and device

2004

4816831979Cryptographic accelerator
4826829357Communication system having a transmitter and a receiver that engage in reduced size encrypted data communication
4836826691Arrangement for encryption/decryption of data and data carrier incorporating same
4846820814Countermeasure method in an electric component using a secret key cryptographic algorithm
4856819764Data processor, communication system and recording medium
4866816593Method and apparatus for transposing bits
4876813710Invisible electronic signature
4886813355Method and arrangement for ciphering information transfer
4896813354Mixing in small batches
4906804355Block cipher for small selectable block sizes
4916782473Network encryption system
4926772343Data processor, communication system and recording medium
4936769063Data converter and recording medium on which program for executing data conversion is recorded
4946768797Method and apparatus for encrypting data in a wireless communication system
4956760439Device for implementing a block-ciphering process
4966754190Channel selection method used in a communication system
4976751319Block cipher method
4986742115Method for negotiating weakened keys in encryption systems
4996732271Method of deciphering ciphered data and apparatus for same
5006731754Apparatus and method for maintaining and transmitting secret contents of a signal
5016698662Devices for hiding operations performed in a microprocesser card
5026683956Encrypting conversion apparatus, decrypting conversion apparatus, cryptographic communication system, and electronic toll collection apparatus

2003

5036658569Secret key cryptographic process for protecting a computer system against attacks by physical analysis
5046654884Hardware-level mitigation and DPA countermeasures for cryptographic devices
5056636970Software encoding using a combination of two types of encoding and encoding type identification information
5066606385Data encrypting/decrypting conversion methods and apparatuses and data communication system adopting the same
5076587030Process for securing the privacy of data transmission
5086578150Block cipher method
5096578143Method for negotiating weakened keys in encryption systems
5106578061Method and apparatus for data permutation/division and recording medium with data permutation/division program recorded thereon
5116570989CRYPTOGRAPHIC PROCESSING APPARATUS, CRYPTOGRAPHIC PROCESSING METHOD, AND STORAGE MEDIUM STORING CRYPTOGRAPHIC PROCESSING PROGRAM FOR REALIZING HIGH-SPEED CRYPTOGRAPHIC PROCESSING WITHOUT IMPAIRING SECURITY
5126566858Circuit for protecting chips against IDD fluctuation attacks
5136553120Method for data decorrelation
5146542607Device and method for the cryptographic processing of a digital data stream presenting any number of data
5156526505DES encryption system
5166510518Balanced cryptographic computational method and apparatus for leak minimizational in smartcards and other cryptosystems
5176504931Method and apparatus for encrypting data
5186504930Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm

2002

5196466669Cipher processor, IC card and cipher processing method
5206463150Encryption device for information in binary code
5216459792Block cipher using key data merged with an intermediate block generated from a previous block
5226434699Encryption processor with shared memory interconnect
5236424713Cryptographic system with concealed work factor
5246418224Methods and apparatus for self-inverting multiple-iteration CMEA crypto-processing for improved security for wireless telephone messages
5256415030Data transformation apparatus and data transformation method
5266408075Information processing equipment and IC card
5276385316Method and apparatus for encrypting data in a wireless communication system
5286377687Methods and apparatus for enhanced CMEA employing enhanced transformations
5296351539Cipher mixer with random number generator
5306347143Cryptographic device with encryption blocks connected parallel
5316345101Cryptographic method and apparatus for data communication and storage

2001

5326327661Using unpredictable information to minimize leakage from smartcards and other cryptosystems
5336327654Semiconductor integrated circuit for cryptographic process and encryption algorithm alternating method
5346324288Cipher core in a content protection system
5356324286DES cipher processor for full duplex interleaving encryption/decryption service
5366320964Cryptographic accelerator
5376314186Block cipher algorithm having a robust security against differential cryptanalysis, linear cryptanalysis and higher-order differential cryptanalysis
5386304657Data encryption apparatus using odd number of shift-rotations and method
5396301362Method and apparatus for cryptographically transforming an input block into an output block
5406298136Cryptographic method and apparatus for non-linearly merging a data block and a key
5416295606Method and apparatus for preventing information leakage attacks on a microelectronic assembly
5426278783Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems
5436272221Encryption apparatus and computor-readable recording medium containing program for realizing the same
5446269164Method of and system for encrypting messages
5456269163Enhanced block ciphers with data-dependent rotations
5466266412Encrypting speech coder
5476266411Method and apparatus for multiple-iteration CMEA encryption and decryption for improved security for wireless telephone messages
5486259789Computer implemented secret object key block cipher encryption and digital signature device and method
5496249582Apparatus for and method of overhead reduction in a block cipher
5506246768Data encryption system for encrypting plaintext data
5516243470Method and apparatus for advanced symmetric key block cipher with variable length key and block
5526233337Methods and apparatus for enhanced security expansion of a secret key into a lookup table for improved security for wireless telephone messages
5536226382Method for implementing a private-key communication protocol between two processing devices
5546219420High assurance encryption system and method
5556201869Data transformation apparatus and data transformation method
5566199162Block cipher method
5576192129Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length key and block
5586189095Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks
5596185679Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks
5606185304Method and apparatus for a symmetric block cipher using multiple stages
5616182216Block cipher method
5626181252Remote control system and method having a system-specific code

2000

5636167553Spiral scrambling
5646157720Method and apparatus for encrypting data
5656118870Microprocessor having instruction set extensions for decryption and multimedia applications
5666108421Method and apparatus for data encryption
5676108419Differential fault analysis hardening apparatus and evaluation method
5686088800Encryption processor with shared memory interconnect
5696075859Method and apparatus for encrypting data in a wireless communication system
5706065117Systems, methods and computer program products for sharing state information between a stateless server and a stateful client
5716058481Smart cards
5726035042High speed and method of providing high speed table generation for block encryption
5736031911Practical S box design
5746028939Data security system and method
5756014442Decrypting method and electronic device

1999

5766005944System and method for constructing block ciphers
5775987124Method and apparatus for encrypting long blocks using a short-block encryption procedure
5785949884Design principles of the shade cipher
5795949883Encryption system for mixed-trust environments
5805930365Digital data shuffling/de-shuffling system
5815909494System and method for constructing a cryptographic pseudo random bit generator
5825893084Method for creating specific purpose rule-based n-bit virtual machines
5835870470Method and apparatus for encrypting long blocks using a short-block encryption procedure

1998

5845852663Information signal transmission system
5855844925Spiral scrambling
5865838796Statistically optimized bit permutations in interated block substitution systems
5875838795Method and apparatus for statistical diffusion in iterated block substitution
5885838794Method and apparatus for inter-round mixing in iterated block substitution systems
5895835600Block encryption algorithm with data-dependent rotations
5905835599Muti-cycle non-parallel data encryption engine
5915832083Method and device for utilizing data content
5925825886Construction symmetric ciphers using the cast design procedure
5935818940Switching matrix
5945799089System and apparatus for blockwise encryption/decryption of data
5955796837Apparatus and method for generating a secure substitution-box immune to cryptanalyses
5965796836Scalable key agile cryptography
5975793940Data processing apparatus
5985778074Methods for generating variable S-boxes from arbitrary keys of arbitrary length including methods which allow rapid key changes
5995768390Cryptographic system with masking
6005751810Bit agitator
6015745577Symmetric cryptographic system for data encryption
6025740251Data processing apparatus
6035740249Encryption apparatus and method capable of controlling encryption process in accordance with an internal state
6045734721Anti-spoof without error extension (ANSWER)
6055727062Variable size block ciphers
6065724428Block encryption algorithm with data-dependent rotations
6075724427Method and apparatus for autokey rotor encryption

1997

6085696823High-bandwidth encryption system with low-bandwidth cryptographic modules
6095687238Small size product cipher apparatus
6105684876Apparatus and method for cipher stealing when encrypting MPEG transport packets
6115682425Information signal transmission system
6125675653Method and apparatus for digital encryption
6135673319Block cipher mode of operation for secure, length-preserving encryption
6145671284Data encryptor having a scalable clock
6155652796Data encryption control system
6165647001Nonlinear dynamic substitution devices and methods for block substitutions employing coset decompositions and direct geometric generation
6175640455Secret-key enciphering method and arrangement therefor capable of preventing unfair acquirement of information
6185631960Autotest of encryption algorithms in embedded secure encryption devices
6195623549Cipher mechanisms with fencing and balanced block mixing
6205623548Transformation pattern generating device and encryption function device
6215606616Cryptographic apparatus with double feedforward hash function
6225600726Method for creating specific purpose rule-based n-bit virtual machines
6235594797Variable security level encryption

1996

6245539827Device and method for data encryption
6255533128Pseudo-random transposition cipher system and method
6265517614Data compression/encryption processing apparatus
6275511123Symmetric cryptographic system for data encryption
6285488661Data communication system and method with data scrambling

1995

6295473693Apparatus for avoiding complementarity in an encryption algorithm
6305452358Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing a data dependent encryption function
6315442705Hardware arrangement for enciphering bit blocks while renewing a key at each iteration
6325432848DES encryption and decryption unit with error checking
6335412729Device and method for data encryption
6345412728Device for security protection of digital data using elementary instructions data processing
6355381480System for translating encrypted data

1994

6365365589Method and apparatus for encryption, decryption and authentication using dynamical systems
6375365588High speed encryption system and method
6385363449Personal identification encryptor and method
6395351299Apparatus and method for data encryption with block selection keys and data encryption keys
6405335280Random sum cipher system and method
6415323464Commercial data masking
6425317639Non-linear block substitution devices derived by constructive corruption
6435317638Performance enhancement for ANSI X3.92 data encryption algorithm standard
6445301235Arrangement for transforming plaintext into ciphertext for use in a data communications system
6455297208Secure file transfer system and method
6465289542Caller identification system with encryption

1993

6475261003Data communication system and method with data scrambling
6485239584Method and apparatus for encryption/authentication of data in energy metering applications
6495231662Method and device for enciphering data to be transferred and for deciphering the enciphered data, and a computer system comprising such a device
6505222139Cryptographic method and apparatus
6515214704Nonlinear dynamic substitution devices and methods for block substitutions
6525214703Device for the conversion of a digital block and use of same
6535214701Method of processing data by compression and permutation for microcircuit cards
6545195136Method and apparatus for data encryption or decryption

1992

6555168523Method of rotating a word constituted by binary elements and arrangement in which the said method is carried out
6565168521Method of executing an irregular permutation of data protected by encryption
6575103479Encipher method and decipher method

1991

6585073935Method for secure communication
6595063596Encryption printed circuit board
6605058163Interface unit for transferring digital data between time-domain multiplexed communication links
6615054067Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator
6625038376Block substitution based encryption by a modulo 2 addition method and apparatus
6635008935Efficient method for encrypting superblocks of data
6645007083Secure computer
6655003597Method and apparatus for data encryption
6665003596Method of cryptographically transforming electronic digital data from one form to another
6674982429Encipher method and decipher method

1990

6684979832Dynamic substitution combiner and extractor
6694937574Data conversion
6704914697Cryptographic method and apparatus with electronically redefinable algorithm
6714910776Encryption printed circuit board
6724907275Encryption apparatus

1989

6734850019Data randomization equipment
6744797928Encryption printed circuit board

1988

6754776011Recursive key schedule cryptographic system
6764751733Substitution permutation enciphering device
6774731843Method and device of increasing the execution speed of cipher feedback mode of the DES by an arbitrary multiplier

1987

6784668103Polygraphic encryption-decryption communications system
6794645871Non-interfering in-band protocol-independent diagnostic scanning in a digital multipoint communication system

1985

6804533948CATV Communication system
6814520232Polygraphic encryption-decryption system

1982

6824322577Cryptosystem

1981

6834275265Complete substitution permutation enciphering and deciphering circuit
6844262358DES Parity check system
6854255811Key controlled block cipher cryptographic system

1980

6864229818Method and apparatus for enciphering blocks which succeed short blocks in a key-controlled block-cipher cryptographic system
6874195200Key controlled block-cipher cryptographic system employing a multidirectional shift matrix

1979

6884177355Array device for data scrambling
6894157454Method and system for machine enciphering and deciphering

1978

6904078152Block-cipher cryptographic system with chaining
6914074066Message verification and transmission error detection by block chaining

1976

6923962539Product block cipher system for data security
6933958081Block cipher system for data security
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017