СПИСОК патентов США - подгруппа МПК16 H04L9/28
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9602280 | System and method for content encryption in a key/value store | |||
2 | 9600421 | Systems and methods for low-latency encrypted storage | |||
3 | 9596293 | Content transmission device and network node | |||
4 | 9591484 | Secure environment for subscriber device | |||
5 | 9584315 | Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof | |||
6 | 9548758 | Secure compressive sampling using codebook of sampling matrices | |||
7 | 9544154 | Method of authenticating a device | |||
8 | 9536102 | Privacy-protective data transfer | |||
2016 | |||||
9 | 9529465 | Secure interaction with input devices | |||
10 | 9520996 | Ciphering data for transmission in a network | |||
11 | 9515818 | Multi-block cryptographic operation | |||
12 | 9509512 | Message digest generator | |||
13 | 9509494 | Computer-implemented system and method for providing secure data processing in a cloud using discrete homomorphic encryption | |||
14 | 9509414 | Encryption and decryption method and device | |||
15 | 9483656 | Efficient and secure data storage utilizing a dispersed data storage system | |||
16 | 9478011 | Method and system for processing of images | |||
17 | 9473297 | Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters | |||
18 | 9461825 | Method and system for preventing revocation denial of service attacks | |||
19 | 9460315 | Order-preserving encryption system, device, method, and program | |||
20 | 9455831 | Order preserving encryption method | |||
21 | 9449177 | General protocol for proactively secure computation | |||
22 | 9438964 | Capturing video of an image with embedded code to access content | |||
23 | 9436835 | Homomorphic encryption in computing systems and environments | |||
24 | 9432190 | Computational systems and methods for double-encrypting data for subsequent anonymous storage | |||
25 | 9430650 | Method for managing memory space in a secure non-volatile memory of a secure element | |||
26 | 9426661 | Secure lock for mobile device | |||
27 | 9425959 | Security variable scrambling | |||
28 | 9425952 | Algebraic manipulation detection codes from algebraic curves | |||
29 | 9419797 | System, processing device, computer program and method, to transparently encrypt and store data objects such that owners of the data object and permitted viewers are able to view decrypted data objects after entering user selected passwords | |||
30 | 9407437 | Secure initialization vector generation | |||
31 | 9401804 | Leakage resilient garbled circuit generation using reduced memory hardware token | |||
32 | 9397830 | Method and apparatus for encrypting and decrypting data | |||
33 | 9397826 | Encryption device and method for defending a physical attack | |||
34 | 9389855 | Arithmetic device | |||
35 | 9385867 | Cryptographic processing system, key generation device, encryption device, decryption device, key delegation device, cryptographic processing method, and cryptographic processing program | |||
36 | 9384484 | Secure content distribution system | |||
37 | 9379893 | Content consumption frustration | |||
38 | 9374226 | Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer | |||
39 | 9372975 | Secure recording and sharing system of voice memo | |||
40 | 9369290 | Challenge-response authentication using a masked response value | |||
41 | 9363076 | Implementing encrypted content in a game | |||
42 | 9361617 | Variable-length cipher system and method | |||
43 | 9356785 | Method and system for security enhancement for mobile communications | |||
44 | 9356784 | Cryptic notes and related apparatus and methods | |||
45 | 9350550 | Power management and security for wireless modules in "machine-to-machine" communications | |||
46 | 9344278 | Secure data transfer using random ordering and random block sizing | |||
47 | 9344277 | Mass serialization analytics | |||
48 | 9344274 | Method and system for encrypting data | |||
49 | 9336404 | Privacy-protective data transfer and storage | |||
50 | 9331853 | Method and apparatus for increasing the output of a cryptographic system | |||
51 | 9325498 | Performing AES encryption or decryption in multiple modes with a single instruction | |||
52 | 9325497 | Power line based theft protection of electronic devices | |||
53 | 9313028 | Method for fully homomorphic encryption using multivariate cryptography | |||
54 | 9313027 | Protection of a calculation performed by an integrated circuit | |||
55 | 9306747 | System and method for second factor authentication | |||
56 | 9298939 | Privacy-protective data transfer | |||
57 | 9298932 | Matrix code for encryption, storage, and transmission of data | |||
58 | 9294915 | Localized network authentication and security using tamper-resistant keys | |||
59 | 9294277 | Audio encryption systems and methods | |||
60 | 9292697 | Matrix code for encryption, storage, and transmission of data | |||
61 | 9281945 | Offline methods for authentication in a client/server authentication system | |||
62 | 9277406 | Methods and system for secure communication between an RFID tag and a reader | |||
63 | 9276745 | Preserving image privacy when manipulated by cloud services | |||
64 | 9276744 | Image data processing device and image data processing program | |||
65 | 9275202 | Data processing method | |||
66 | 9270462 | Method and system for conducting high speed, symmetric stream cipher encryption | |||
67 | 9270274 | FPGA configuration data scrambling using input multiplexers | |||
68 | 9258303 | Method of providing real-time secure communication between end points in a network | |||
69 | 9240885 | Cryptographic processing apparatus, cryptographic processing method, and computer program therefor | |||
70 | 9237014 | Partial CipherText updates using variable-length segments delineated by pattern matching and encrypted by fixed-length blocks | |||
71 | 9231922 | Cloud storage system, data encryption processing device and data encryption method in cloud storage system | |||
72 | 9231768 | Utilizing a deterministic all or nothing transformation in a dispersed storage network | |||
73 | 9229823 | Storage and retrieval of dispersed storage network access information | |||
2015 | |||||
74 | 9226043 | Displaying content associated with code embedded in an image | |||
75 | 9215069 | Methods and apparatus for device authentication with one-time credentials | |||
76 | 9215067 | Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters | |||
77 | 9209979 | Secure network cloud architecture | |||
78 | 9209978 | Methods and apparatus to measure exposure to streaming media | |||
79 | 9209973 | Delegate authorization in cloud-based storage system | |||
80 | 9197412 | Low-complexity electronic circuit protected by customized masking | |||
81 | 9191207 | Anti-spying encrypted keyboard | |||
82 | 9184918 | Trusted hardware for attesting to authenticity in a cloud environment | |||
83 | 9172538 | Secure lock for mobile device | |||
84 | 9167314 | Embedding information in an image | |||
85 | 9166893 | Methods, apparatus and systems for monitoring locations of data within a network service | |||
86 | 9166789 | Cryptographic processing apparatus | |||
87 | 9166785 | Cryptography processing device and cryptography processing method | |||
88 | 9160522 | System and method for verifying the identity of an individual by employing biometric data features associated with the individual | |||
89 | 9154300 | Method and apparatus for determining joint randomness | |||
90 | 9143326 | Method and system for encrypting data | |||
91 | 9143325 | Masking with shared random bits | |||
92 | 9143324 | Secure messaging | |||
93 | 9130918 | System and method for automatically verifying storage of redundant contents into communication equipments, by data comparison | |||
94 | 9130752 | Tamper-resistant coating for an integrated circuit | |||
95 | 9124417 | Computation of garbled tables in garbled circuit | |||
96 | 9118481 | Method and system for efficiently generating a high quality pseudo-random sequence of numbers with extraordinarily long periodicity | |||
97 | 9118463 | Distributed single sign on technologies including privacy protection and proactive updating | |||
98 | 9112886 | Method and system for providing centralized data field encryption, and distributed storage and retrieval | |||
99 | 9112699 | System, processing device, computer program and method, to tranparently encrypt and store data objects such that owners of the data object and permitted viewers are able to view decrypted data objects after entering user selected passwords | |||
100 | 9112698 | Cryptographic device and method for data encryption with per-round combined operations | |||
101 | 9106421 | Securing communications over a first communication link with encryption managed by a second communication link | |||
102 | 9106366 | Distributing data to multiple clients from server | |||
103 | 9100188 | Hardware-based root of trust for cloud environments | |||
104 | 9100185 | Encryption processing apparatus and method | |||
105 | 9100184 | Instructions processors, methods, and systems to process BLAKE secure hashing algorithm | |||
106 | 9100183 | Computer program product and method for order preserving symbol based encryption | |||
107 | 9094204 | Image encryption system and image decryption system | |||
108 | 9088553 | Transmitting message prior to transmitting encapsulated packets to assist link partner in decapsulating packets | |||
109 | 9083528 | Authentication of encrypted data blocks | |||
110 | 9083527 | Using mobile data to establish a shared secret in second-factor authentication | |||
111 | 9083526 | Fully homomorphic encryption | |||
112 | 9082279 | Method for securely dematerializing the transfer of evidence in data-stream production systems, in particular video-surveillance systems | |||
113 | 9077856 | Method for local conditional access for mobile equipments | |||
114 | 9065654 | Parallel encryption/decryption | |||
115 | 9065631 | Integrated cryptographic module providing confidentiality and integrity | |||
116 | 9064370 | Method for conducting a sports technology reality television show | |||
117 | 9064229 | Real-time asset tracking using discovery services | |||
118 | 9064135 | Hardware implemented key management system and method | |||
119 | 9059852 | Validating a user's identity utilizing information embedded in a image file | |||
120 | 9059851 | Method and computer program product for order preserving symbol based encryption | |||
121 | 9059838 | Encryption algorithm with randomized buffer | |||
122 | 9058507 | Signal processor with an encrypting or decrypting device in a memory system | |||
123 | 9055349 | Displaying video retrieved from embedded code in a still image | |||
124 | 9054872 | Secure lookup | |||
125 | 9054871 | Physical key-protected one time pad | |||
126 | 9054870 | Information security based on eigendecomposition | |||
127 | 9049021 | Method for determining the cofactor of an elliptic curve, corresponding electronic component and computer program product | |||
128 | 9047461 | Computer-implemented method for replacing a data string | |||
129 | 9047167 | Calculating the modular inverses of a value | |||
130 | 9037863 | Terminal device, server device, content recording control system, recording method, and recording permission control method | |||
131 | 9031229 | Computer-implemented system and method for providing data privacy in a cloud using discrete homomorphic encryption | |||
132 | 9031228 | Systems and methods for implementing block cipher algorithms on attacker-controlled systems | |||
133 | 9025765 | Data security | |||
134 | 9020148 | Protection of registers against unilateral disturbances | |||
135 | 9015819 | Method and system for single sign-on | |||
136 | 9014370 | High performance hardware-based execution unit for performing C2 block cipher encryption/decryption | |||
137 | 9002000 | Method for conversion of a first encryption into a second encryption | |||
138 | 9001999 | Updating stored passwords | |||
139 | 8983061 | Method and apparatus for cryptographically processing data | |||
140 | 8972745 | Secure data handling in a computer system | |||
141 | 8958550 | Encryption operation with real data rounds, dummy data rounds, and delay periods | |||
142 | 8953785 | Instruction set for SKEIN256 SHA3 algorithm on a 128-bit processor | |||
143 | 8948376 | Format-preserving encryption via rotating block encryption | |||
144 | 8942373 | Data encryption and decryption method and apparatus | |||
145 | 8942372 | Method and device for identifying objects | |||
146 | 8938068 | Functional encryption applied system, information output apparatus, information processing apparatus, encryption protocol execution method, information output method, information processing method, program and recording medium | |||
147 | 8938067 | Format preserving encryption methods for data strings with constraints | |||
148 | 8935541 | Method and apparatus for encrypting and processing data in flash translation layer | |||
149 | 8934624 | Decoupling rights in a digital content unit from download | |||
150 | 8929542 | Cryptographic processing system, key generation device, key delegation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program | |||
2014 | |||||
151 | 8924448 | Arithmetic device, method, and program product | |||
152 | 8924303 | Method and system for obtaining feedback for a product | |||
153 | 8917871 | Asymmetrical chaotic encryption | |||
154 | 8913740 | Method and apparatus for generating an Advanced Encryption Standard (AES) key schedule | |||
155 | 8913739 | Method for scalar multiplication in elliptic curve groups over prime fields for side-channel attack resistant cryptosystems | |||
156 | 8908860 | Information processing device, system, and method, including hash value replacement processing and signature verification processing as part of encrypted content playback propriety determination processing | |||
157 | 8903083 | Fast evaluation of many polynomials with small coefficients on the same point | |||
158 | 8891756 | Collision-resistant elliptic curve hash functions | |||
159 | 8886926 | Single-pass data compression and encryption | |||
160 | 8886925 | Protecting enterprise data through policy-based encryption of message attachments | |||
161 | 8886711 | File system adapted for use with a dispersed data storage network | |||
162 | 8885817 | Nonlinear feedback shift register and method for nonlinear signature formation | |||
163 | 8879735 | Shared secret arrangements and optical data transfer | |||
164 | 8861717 | Verification device, secret information restoration device, verification method, program, and secret sharing system | |||
165 | 8856546 | Speed up secure hash algorithm (SHA) using single instruction multiple data (SIMD) architectures | |||
166 | 8856510 | Method for joining user domain and method for exchanging information in user domain | |||
167 | 8855297 | Device and authentication method therefor | |||
168 | 8850213 | Method for verifying an electronic signature and data processing device | |||
169 | 8842840 | Demand based encryption and key generation and distribution systems and methods | |||
170 | 8842824 | Encryption processing circuit and decryption processing circuit, methods thereof, and programs thereof | |||
171 | 8838997 | Instruction set for message scheduling of SHA256 algorithm | |||
172 | 8837719 | Cryptographic methods and devices for pseudo-random generation, encrypting data, and cryptographically hashing a message | |||
173 | 8837715 | Method and apparatus for secure iterative processing and adaptive filtering | |||
174 | 8831213 | Methods and apparatus for protecting digital content | |||
175 | 8819410 | Private electronic information exchange | |||
176 | 8811611 | Encryption/decryption of digital data using related, but independent keys | |||
177 | 8811607 | Processing context information | |||
178 | 8804953 | Extensive ciphertext feedback | |||
179 | 8804950 | Methods and apparatus for producing a hash value based on a hash function | |||
180 | 8793500 | Hybrid signature scheme | |||
181 | 8793484 | Electronic device with message encryption function and message encryption method | |||
182 | 8787583 | Systems and methods for distributing and securing data | |||
183 | 8787563 | Data converter, data conversion method and program | |||
184 | 8782437 | Content protection using block reordering | |||
185 | 8781110 | Unified system architecture for elliptic-curve cryptography | |||
186 | 8775813 | ElGamal signature schemes | |||
187 | 8769310 | Encrypting data objects to back-up | |||
188 | 8769282 | Localized network authentication and security using tamper-resistant keys | |||
189 | 8767955 | Protection of a modular exponentiation calculation by multiplication by a random quantity | |||
190 | 8762743 | Encrypting data objects to back-up | |||
191 | 8761389 | Memory | |||
192 | 8756410 | Polynomial evaluation delegation | |||
193 | 8751822 | Cryptography using quasigroups | |||
194 | 8750707 | System and method for establishing secure communications between transceivers in undersea optical communication systems | |||
195 | 8750500 | Multi-dimensional montgomery ladders for elliptic curves | |||
196 | 8744074 | Method and device for countering fault attacks | |||
197 | 8744072 | Exponentiation method resistant against side-channel and safe-error attacks | |||
198 | 8744071 | Dispersed data storage system data encryption and encoding | |||
199 | 8731187 | Computing genus-2 curves using general isogenies | |||
200 | 8726030 | Terminal device, server device, content recording control system, recording method, and recording permission control method | |||
201 | 8726029 | Cryptographic processing of content | |||
202 | 8718280 | Securing keys of a cipher using properties of the cipher process | |||
203 | 8718276 | Cryptography on a elliptical curve | |||
204 | 8713315 | Content distribution system, mobile communication terminal device, and computer readable medium | |||
205 | 8712054 | Method and system for establishing enhanced key when terminal moves to enhanced universal terminal radio access network (UTRAN) | |||
206 | 8712038 | Cryptography on a simplified elliptical curve | |||
207 | 8712037 | Data encoding and decoding apparatus and method thereof for verifying data integrity | |||
208 | 8712035 | Online data conversion technique using a sliding window | |||
209 | 8705729 | Audio content protection | |||
210 | 8700921 | Fault-resistant exponentiation algorithm | |||
211 | 8700916 | Utilizing physically unclonable functions to derive device specific keying material for protection of information | |||
212 | 8694789 | System and method for generating a non-repudiatable record of a data stream | |||
213 | 8693684 | Method and apparatus for computing a shared secret key | |||
214 | 8688998 | Resilent cryptographic scheme | |||
215 | 8687802 | Method and system for accelerating the deterministic enciphering of data in a small domain | |||
216 | 8683206 | System and method of authenticating multiple files using a detached digital signature | |||
217 | 8683189 | On-chip security method and apparatus | |||
218 | 8681975 | Encryption method and apparatus using composition of ciphers | |||
219 | 8677152 | Method and apparatus for encrypting media programs for later purchase and viewing | |||
220 | 8675867 | Key generation algorithm using secret polynomial over finite ring and transformation | |||
221 | 8667274 | System and method for WORM data storage | |||
222 | 8666064 | Endecryptor capable of performing parallel processing and encryption/decryption method thereof | |||
223 | 8660263 | Power analysis attack countermeasure for the ECDSA | |||
224 | 8660262 | Method and device for generating random wait states | |||
225 | 8649508 | System and method for implementing elliptic curve scalar multiplication in cryptography | |||
226 | 8644501 | Paired carrier and pivot steganographic objects for stateful data layering | |||
227 | 8638926 | Sharing a secret with modular inverses | |||
228 | 8635635 | Factoring middleware for anti-piracy | |||
229 | 8635320 | Air conditioning management apparatus and air conditioning management system | |||
230 | 8634550 | Architecture and instruction set for implementing advanced encryption standard (AES) | |||
231 | 8631237 | Simplified login for mobile devices | |||
232 | 8627073 | Adaptive certificate distribution mechanism in vehicular networks using forward error correcting codes | |||
233 | 8625780 | Reduction of side-channel information by interacting crypto blocks | |||
2013 | |||||
234 | 8619980 | Information generation apparatus, method, program, and recording medium for deriving a decryption key from another decryption key | |||
235 | 8615078 | Method and apparatus for processing F-function in seed encryption system | |||
236 | 8612771 | Verifying authenticity of playback device | |||
237 | 8607347 | Network stream scanning facility | |||
238 | 8607343 | Ticket-based personalization | |||
239 | 8594322 | Encoding/decoding apparatus | |||
240 | 8589700 | Data whitening for writing and reading data to and from a non-volatile memory | |||
241 | 8589699 | Storage media device and recording apparatus | |||
242 | 8584235 | Fuzzy whitelisting anti-malware systems and methods | |||
243 | 8582777 | Method and system for lightweight key distribution in a wireless network | |||
244 | 8582758 | Apparatus and a method for calculating a multiple of a point an elliptic curve | |||
245 | 8578166 | System and method for authentication, data transfer, and protection against phishing | |||
246 | 8577037 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
247 | 8577030 | Cryptographic processing system, key generation device, key delegation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program | |||
248 | 8577023 | Encryption processing method, apparatus, and computer program utilizing different types of S-boxes | |||
249 | 8566607 | Cryptography methods and apparatus used with a processor | |||
250 | 8560847 | Light access authentication method and system | |||
251 | 8553887 | Method for generating dynamic group key | |||
252 | 8553877 | Substitution table masking for cryptographic processes | |||
253 | 8549310 | Method and apparatus for secure measurement certification | |||
254 | 8549305 | Steganographic method and device | |||
255 | 8548165 | Method of compressing a cryptographic value | |||
256 | 8548161 | Crytographically transforming data text | |||
257 | 8543630 | Exponentiation calculation apparatus and method for calculating square root in finite extension field | |||
258 | 8542103 | Radio frequency identification reading by using error correcting codes on sets of tags | |||
259 | 8538014 | Fast computation of one-way hash sequences | |||
260 | 8533807 | Methods for accessing content based on a session ticket | |||
261 | 8526614 | Method to manage members of at least one group of decoders having access to broadcast data | |||
262 | 8522015 | Authentication of binaries in memory with proxy code execution | |||
263 | 8520846 | Method and device for key generation | |||
264 | 8515059 | Cryptographic processor with dynamic update of encryption state | |||
265 | 8515057 | Method and device for executing crytographic calculation | |||
266 | 8510824 | Method, system, subscriber equipment and multi-media server for digital copyright protection | |||
267 | 8504845 | Protecting states of a cryptographic process using group automorphisms | |||
268 | 8503679 | Short message encryption | |||
269 | 8495390 | System and method for data obfuscation based on discrete logarithm properties | |||
270 | 8488781 | Method for implementing symmetric key encryption algorithm against power analysis attacks | |||
271 | 8484485 | Encryption device and encryption system | |||
272 | 8484475 | Data transmission method, and tachograph system | |||
273 | 8479270 | Method for allocating authorization key identifier for wireless portable internet system | |||
274 | 8477933 | Cryptographic algorithm fault protections | |||
275 | 8467533 | One-time-pad encryption with key ID and offset for starting point | |||
276 | 8467526 | Key evolution method and system of block ciphering | |||
277 | 8467525 | Steganographic method and device | |||
278 | 8462943 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel | |||
279 | 8462939 | RNS-based cryptographic system and method | |||
280 | 8457302 | Access-controlled data storage medium | |||
281 | 8452005 | Unicode-compatible encipherment | |||
282 | 8442219 | Public key cryptographic methods and systems | |||
283 | 8438205 | Exponentiation calculation apparatus and method for calculating square root in finite extension field | |||
284 | 8437470 | Method and system for block cipher encryption | |||
285 | 8433927 | Cryptographically-enabled privileged mode execution | |||
286 | 8433899 | System and method for authenticating data using incompatible digest functions | |||
287 | 8428251 | System and method for stream/block cipher with internal random states | |||
288 | 8422674 | Application-specific secret generation | |||
289 | 8422667 | Method and apparatus to facilitate transmission of an encrypted rolling code | |||
290 | 8416949 | Actor node, sensor node, coverage block change method, parameter change method, program, and information processing system | |||
291 | 8406423 | Multi-bit cryptographically secure encryptor for M-ary spectral phase encoder optical code division multiple access | |||
292 | 8406422 | Cryptographic module management apparatus, method, and program | |||
293 | 8406421 | Method and system for multi-level secure personal profile management and access control to the enterprise multi-modal communication environment in heterogeneous convergent communication networks | |||
294 | 8396208 | Memory system with in stream data encryption/decryption and error correction | |||
295 | 8386803 | System and method for data obfuscation based on discrete logarithm properties | |||
296 | 8386791 | Secure data processing method based particularly on a cryptographic algorithm | |||
297 | 8386790 | Method of using ECDSA with winternitz one time signature | |||
298 | 8385541 | Method of performing elliptic polynomial cryptography with elliptic polynomial hopping | |||
299 | 8374343 | DES hardware throughput for short operations | |||
300 | 8374342 | Scalar multiplier and scalar multiplication program | |||
301 | 8374340 | Method for secure transmission of data | |||
302 | 8370642 | Cryptographic processing apparatus | |||
303 | 8364964 | Registering client devices with a registration server | |||
304 | 8363839 | Image forming apparatus | |||
305 | 8363826 | Scrambler, scramble processing method, and program | |||
306 | 8355499 | Parallel encryption/decryption | |||
307 | 8353018 | Automatic local listing owner authentication system | |||
308 | 8351601 | Elliptic polynomial cryptography with secret key embedding | |||
309 | 8351599 | Cryptographic device for fast session switching | |||
310 | 8345862 | Method of sharing a strong secret between two parties, one of whom has little processing power | |||
311 | 8345315 | Method and device for making documents secure using unique imprint derived from unique marking variations | |||
2012 | |||||
312 | 8341429 | Data transfer device | |||
313 | 8335314 | Adaptive and secure modular connection | |||
314 | 8332635 | Updateable secure kernel extensions | |||
315 | 8331559 | Diffused data encryption/decryption processing method | |||
316 | 8331558 | Method of cipher block chaining using elliptic curve cryptography | |||
317 | 8331557 | Power analysis attack countermeasure for the ECDSA | |||
318 | 8331556 | Asymmetrical method of encryption or signature verification | |||
319 | 8325913 | System and method of authentication | |||
320 | 8320558 | Encryption of synchronization information | |||
321 | 8320557 | Cryptographic system including a mixed radix number generator with chosen statistical artifacts | |||
322 | 8295478 | Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure | |||
323 | 8291235 | Method and system for controlling access of clients and users to a print server | |||
324 | 8291229 | System and method for digital signatures and authentication | |||
325 | 8291221 | Method and apparatus for implementing a novel one-way hash function on highly constrained devices such as RFID tags | |||
326 | 8290147 | Systems and methods for efficiently creating digests of digital data | |||
327 | 8290145 | Transition between masked representations of a value during cryptographic calculations | |||
328 | 8281155 | Content protection using block reordering | |||
329 | 8280059 | Method, system and device for generating group key | |||
330 | 8275126 | Apparatus and method for hash cryptography | |||
331 | 8275125 | Method for designing a secure hash function and a system thereof | |||
332 | 8266421 | Private electronic information exchange | |||
333 | 8261098 | Method and apparatus for encrypting and processing data in flash translation layer | |||
334 | 8259932 | Computing modular polynomials modulo large primes | |||
335 | 8250665 | Digital Broadcasting system and method of processing data in digital broadcasting system | |||
336 | 8233620 | Key recovery mechanism for cryptographic systems | |||
337 | 8233614 | Integer division method secure against covert channel attacks | |||
338 | 8229114 | Identity-based key generating methods and devices | |||
339 | 8229110 | Pipelined packet encryption and decryption using counter mode with cipher-block chaining message authentication code protocol | |||
340 | 8225391 | System and method for improving restrictiveness on accessing software applications | |||
341 | 8213602 | Method and system for encrypting and decrypting a transport stream using multiple algorithms | |||
342 | 8208632 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
343 | 8204214 | Method and system for generating data transaction ID | |||
344 | 8204213 | System and method for performing a similarity measure of anonymized data | |||
345 | 8194854 | Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation | |||
346 | 8189770 | Tweakable block encryption apparatus, method, and program | |||
347 | 8189768 | Secure messaging | |||
348 | 8184806 | Table masking for resistance to power analysis attacks | |||
349 | 8184804 | Hash function using a piling-up process | |||
350 | 8180046 | Method for making secure an electronic entity with encrypted access | |||
351 | 8170204 | Method and system for extending advanced encryption standard (AES) operations for enhanced security | |||
352 | 8165286 | Combination white box/black box cryptographic processes and apparatus | |||
353 | 8161285 | Protocol-Independent remote attestation and sealing | |||
354 | 8160245 | Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting | |||
355 | 8160242 | Efficient implementation of arithmetical secure hash techniques | |||
356 | 8144864 | Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems | |||
357 | 8139763 | Randomized RSA-based cryptographic exponentiation resistant to side channel and fault attacks | |||
358 | 8135132 | Method and system for secure storage, transmission and control of cryptographic keys | |||
359 | 8135129 | Protection of a modular exponentiation calculation performed by an integrated circuit | |||
360 | 8130964 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
361 | 8130962 | Content protection method and apparatus | |||
362 | 8130946 | Iterative symmetric key ciphers with keyed S-boxes using modular exponentiation | |||
363 | 8130944 | Digital encrypted time capsule | |||
364 | 8111827 | Cryptographic processing apparatus and cryptographic processing method | |||
365 | 8107622 | System and method to preclude message modification in data authentication systems through efficent use of feedback in cryptographic functions | |||
366 | 8107620 | Simple and efficient one-pass authenticated encryption scheme | |||
367 | 8102997 | Processor for executing an AES-type algorithm | |||
368 | 8102996 | Scrambler, descrambler and method, and disc apparatus | |||
369 | 8098816 | Apparatus and method for evaluating a cipher structure's resistance to cryptanalysis | |||
370 | 8094811 | Data encryption device and data encryption method | |||
371 | 8090099 | Computer-readable recording medium recording program and apparatus for encryption/decryption, apparatus for multiplication in extension field | |||
372 | 8090098 | Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher | |||
2011 | |||||
373 | 8086867 | Secure identity and privilege system | |||
374 | 8086864 | Low power HMAC encryption apparatus | |||
375 | 8086854 | Content protection information using family of quadratic multivariate polynomial maps | |||
376 | 8085931 | Computation method, computing device and computer program | |||
377 | 8079071 | Methods for accessing content based on a session ticket | |||
378 | 8077864 | Apparatus for computing streamcipher TSC-4 | |||
379 | 8077863 | Secret sharing apparatus, method, and program | |||
380 | 8074068 | Secret sharing device, method, and program | |||
381 | 8059964 | QKD system with common-mode dithering | |||
382 | 8054967 | Computer system and computer program executing encryption or decryption | |||
383 | 8050410 | Distributed encryption methods and systems | |||
384 | 8050404 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel | |||
385 | 8036378 | System and method of authentication | |||
386 | 8032762 | Process, circuits, devices, and systems for encryption and decryption and other purposes, and process making | |||
387 | 8028157 | On-chip security method and apparatus | |||
388 | 8027474 | Method and system for secure data aggregation in wireless sensor networks | |||
389 | 8027466 | Power analysis attack countermeasure for the ECDSA | |||
390 | 8014521 | Cryptographic computation method, cryptographic system, and computer program | |||
391 | 8014520 | Exponentiation ladder for cryptography | |||
392 | 8010801 | Multi-data rate security architecture for network security | |||
393 | 8009828 | Integrated shuffle validity proving device, proof integrating device, integrated shuffle validity verifying device, and mix net system | |||
394 | 8009827 | Encryption processing method and encryption processing device | |||
395 | 8006090 | System and method for combining user and platform authentication in negotiated channel security protocols | |||
396 | 8005210 | Modulus scaling for elliptic-curve cryptography | |||
397 | 8005209 | Invariance based concurrent error detection for the advanced encryption standard | |||
398 | 8001385 | Method and apparatus for flash updates with secure flash | |||
399 | 8001381 | Method and system for mutual authentication of nodes in a wireless communication network | |||
400 | 8001374 | Memory encryption for digital video | |||
401 | 7996679 | System and method for performing a trust-preserving migration of data objects from a source to a target | |||
402 | 7995752 | Method for accelerating cryptographic operations on elliptic curves | |||
403 | 7995749 | Cryptographic system configured for extending a repetition period of a random sequence | |||
404 | 7991162 | Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields | |||
405 | 7987367 | Method and apparatus for key agreement between devices using polynomial ring | |||
406 | 7986779 | Efficient elliptic-curve cryptography based on primality of the order of the ECC-group | |||
407 | 7983414 | Protected cryptographic calculation | |||
408 | 7978846 | Scale-invariant barrett reduction for elliptic-curve cyrptography | |||
409 | 7974405 | Method and device for calculating a function from a large number of inputs | |||
410 | 7970128 | Systems and methods for efficient generation of hash values of varying bit widths | |||
411 | 7962753 | Method and a circuit for SHA operation with power saved | |||
412 | 7961877 | Factoring based modular exponentiation | |||
413 | 7961872 | Flexible hardware architecture for ECC/HECC based cryptography | |||
414 | 7961871 | Encryption process, encryption device, and computer-readable medium storing encryption program | |||
415 | 7957527 | Cryptographic processing apparatus | |||
416 | 7953221 | Method for processing multiple operations | |||
417 | 7949130 | Architecture and instruction set for implementing advanced encryption standard (AES) | |||
418 | 7949129 | Method and apparatus for facilitating efficient authenticated encryption | |||
419 | 7949128 | Method and device for the encryption and decryption of data | |||
420 | 7945044 | Method and system for performing an untraceable secret matching | |||
421 | 7940928 | Systems and methods for protecting data secrecy and integrity | |||
422 | 7940927 | Information security device and elliptic curve operating device | |||
423 | 7940926 | Cooperative encoding of data by pluralities of parties | |||
424 | 7936869 | Verifying digital signature based on shared knowledge | |||
425 | 7933905 | Universal-hash-function-family calculation unit and shared-key generation system | |||
426 | 7930556 | Fingerprint system and method for access control | |||
427 | 7929689 | Call signs | |||
428 | 7926100 | Method for preventing unauthorized connection in network system | |||
429 | 7908472 | Secure sockets layer cut through architecture | |||
430 | 7907722 | Protection against power analysis attacks | |||
431 | 7904721 | Digital certificates | |||
432 | 7890759 | Connection assistance apparatus and gateway apparatus | |||
433 | 7886162 | Cryptographic secure program overlays | |||
434 | 7886143 | Multi-data rate cryptography architecture for network security | |||
435 | 7885639 | Method and apparatus for authenticating a wireless access point | |||
436 | 7882355 | Encryption/decryption methods and devices utilizing the same | |||
437 | 7881473 | Quantum key distribution system and method | |||
438 | 7881465 | Circuit and method for calculating a logic combination of two encrypted input operands | |||
439 | 7876893 | Logic circuit and method for calculating an encrypted result operand | |||
440 | 7873161 | Small hardware implementation of the subbyte function of rijndael | |||
441 | 7870393 | Steganographic method and device | |||
442 | 7869590 | Method and system for hardware accelerator for implementing f9 integrity algorithm in WCDMA compliant handsets | |||
443 | 7864952 | Data processing systems with format-preserving encryption and decryption engines | |||
444 | 7864951 | Scalar multiplication method with inherent countermeasures | |||
2010 | |||||
445 | 7861312 | MP3 player with digital rights management | |||
446 | 7861306 | Method and system for limiting the use of user-specific software features | |||
447 | 7860252 | Circuit security | |||
448 | 7860242 | Method of securely implementing a cryptography algorithm of the RSA type, and a corresponding component | |||
449 | 7856101 | Method for elliptic curve scalar multiplication | |||
450 | 7856099 | Secure data transmission between two modules | |||
451 | 7853805 | Anti-tamper system | |||
452 | 7853014 | Ring arithmetic method, system, and apparatus | |||
453 | 7853013 | Cryptographic method and system for encrypting input data | |||
454 | 7853011 | Methods and apparatus for monitoring the integrity of a quantum channel supporting multi-quanta pulse transmission | |||
455 | 7849318 | Method for session security | |||
456 | 7848515 | Encryption protection method | |||
457 | 7848514 | Table masking for resistance to power analysis attacks | |||
458 | 7840000 | High performance programmable cryptography system | |||
459 | 7836515 | System and method for enhanced piracy protection in a wireless personal communication device | |||
460 | 7836310 | Security system that uses indirect password-based encryption | |||
461 | 7835517 | Encryption processing apparatus, encryption processing method, and computer program | |||
462 | 7831039 | AES encryption circuitry with CCM | |||
463 | 7822204 | Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, transmission/reception system, and communication system | |||
464 | 7809133 | Randomized modular reduction method and hardware therefor | |||
465 | 7809132 | Implementations of AES algorithm for reducing hardware with improved efficiency | |||
466 | 7801298 | Apparatus and method for detecting a potential attack on a cryptographic calculation | |||
467 | 7796750 | Method for making secure an electronic entity with encrypted access | |||
468 | 7792288 | Communication system using quantum cryptography and comprising switching stations | |||
469 | 7792286 | Signature generation device and signature verification device | |||
470 | 7787619 | Method and apparatus for secure key management using multi-threshold secret sharing | |||
471 | 7783040 | Encryption in a secure computerized gaming system | |||
472 | 7779272 | Hardware cryptographic engine and encryption method | |||
473 | 7778415 | Substitution cipher text-encoding and un-encoding software and method | |||
474 | 7778414 | Encryption method based on factorization | |||
475 | 7769165 | Semi-public white-box cipher | |||
476 | 7769164 | Printing apparatus | |||
477 | 7764789 | Key bit stream generation | |||
478 | 7764788 | Methods and apparatus for performing authentication and decryption | |||
479 | 7764786 | Protection of a DES algorithm | |||
480 | 7764785 | Method for communicating securely over an insecure communication channel | |||
481 | 7761712 | Steganographic method and device | |||
482 | 7760874 | Method and system for implementing FI function in KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets | |||
483 | 7757091 | Method and apparatus for the creation of a self-authenticating document | |||
484 | 7752449 | System and method for generating a non-repudiatable record of a data stream | |||
485 | 7751567 | Local authentication of mobile subscribers outside their home systems | |||
486 | 7742595 | Cryptographic method protected against covert channel type attacks | |||
487 | 7734048 | Cryptographic system using chaotic dynamics | |||
488 | 7730319 | Provisional signature schemes | |||
489 | 7724897 | Program converter, encrypting device, and encrypting method | |||
490 | 7724896 | Method for transmitting messages between an emitter and at least on receiver and system for implementing said method | |||
491 | 7720228 | Modulator autocalibration methods for quantum key distribution | |||
492 | 7720219 | Apparatus and method for implementing a hash algorithm word buffer | |||
493 | 7706528 | Prime calculating apparatus, key issuing system, and prime calculation method | |||
494 | 7702898 | Method for authenticating and verifying SMS communications | |||
495 | 7702100 | Key generation for advanced encryption standard (AES) Decryption and the like | |||
496 | 7702099 | Multipoint synchronous diffused encryption/decryption method | |||
497 | 7702098 | Elliptic curve point octupling for weighted projective coordinates | |||
498 | 7697688 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
499 | 7697683 | Cryptography-processing method, cryptography-processing apparatus and computer program | |||
500 | 7697681 | Parallelizable integrity-aware encryption technique | |||
501 | 7697680 | Traceable method and system for encrypting and/or decrypting data, and recording media for implementing the method | |||
502 | 7693277 | Generating digital signatures using ephemeral cryptographic key | |||
503 | 7688972 | Method and system for implementing FO function in KASUMI algorithm for accelerating cryptography in GSM (global system for mobile communication)GPRS (general packet radio service)edge(enhanced data rate for GSM evolution) compliant handsets | |||
504 | 7684563 | Apparatus and method for implementing a unified hash algorithm pipeline | |||
505 | 7680270 | System for elliptic curve encryption using multiple points on an elliptic curve derived from scalar multiplication | |||
506 | 7680268 | Elliptic curve point octupling using single instruction multiple data processing | |||
507 | 7676040 | Changing encryption key of encrypted data | |||
508 | 7676037 | Cryptographic method capable of protecting elliptic curve code from side channel attacks | |||
509 | 7664957 | Digital signatures including identity-based aggregate signatures | |||
510 | 7664710 | Remote authentication of two dimensional barcoded indicia | |||
511 | 7664258 | Randomized sparse formats for efficient and secure computation on elliptic curves | |||
512 | 7661011 | Method and apparatus for a variable processing period in an integrated circuit | |||
513 | 7646868 | Method for steganographic cryptography | |||
2009 | |||||
514 | 7634091 | System and method of hiding cryptographic private keys | |||
515 | 7634085 | Identity-based-encryption system with partial attribute matching | |||
516 | 7634084 | Prime calculation device, method, and key issuing system | |||
517 | 7623658 | Method and system for implementing the A5/3 encryption algorithm for GSM and EDGE compliant handsets | |||
518 | 7617527 | Architecture for virtual private networks | |||
519 | 7614077 | Persistent access control of protected content | |||
520 | 7606361 | Sending a message securely over an insecure channel | |||
521 | 7602905 | Processes, circuits, devices, and systems for encryption and decryption and other purposes, and processes of making | |||
522 | 7602904 | Order invariant fuzzy commitment system | |||
523 | 7600134 | Theft deterrence using trusted platform module authorization | |||
524 | 7599490 | Method and apparatus for data encryption | |||
525 | 7596703 | Hidden data backup and retrieval for a secure device | |||
526 | 7593529 | Scramble methods and apparatus for packetized digital video signal in conditional access system | |||
527 | 7593525 | Patternless encryption and decryption system and method | |||
528 | 7590235 | Reduction calculations in elliptic curve cryptography | |||
529 | 7587605 | Cryptographic pairing-based short signature generation and verification | |||
530 | 7580519 | Triple DES gigabit/s performance using single DES engine | |||
531 | 7577255 | Proxy method and system for secure wireless administration of managed entities | |||
532 | 7574600 | System and method for combining user and platform authentication in negotiated channel security protocols | |||
533 | 7571324 | Method and device for anonymous signature with a shared private key | |||
534 | 7567668 | Calculating unit and method for performing an arithmetic operation with encrypted operands | |||
535 | 7565537 | Secure key exchange with mutual authentication | |||
536 | 7564970 | Exponential data transform to enhance security | |||
537 | 7551737 | Cryptographic keys using random numbers instead of random primes | |||
538 | 7546430 | Method of address space layout randomization for windows operating systems | |||
539 | 7539868 | Run-time firmware authentication | |||
540 | 7539305 | Schryption method and device | |||
541 | 7536011 | Tamper-proof elliptic encryption with private key | |||
542 | 7532726 | Encryption/decryption device and method, encryption device and method, decryption device and method, and transmission/reception apparatus | |||
543 | 7532721 | Implementation of a switch-box using a subfield method | |||
544 | 7532720 | Utilizing SIMD instructions within montgomery multiplication | |||
545 | 7530114 | Content delivery method and content delivery system | |||
546 | 7529939 | Method of and apparatus for transferring data | |||
547 | 7529365 | Device and method of applying check bit to encrypt instruction for protection | |||
548 | 7512800 | Key management technique for establishing a secure channel | |||
549 | 7512239 | Protection key for hardware and information management system | |||
550 | 7512233 | Method and apparatus for computing a shared secret key | |||
551 | 7512231 | Computation method for modular exponentiation operation in decryption or signature generation | |||
552 | 7508936 | Hardware accelerator for elliptic curve cryptography | |||
553 | 7499542 | Device and method for encrypting and decrypting a block of data | |||
554 | 7490240 | Electronically signing a document | |||
555 | 7487364 | Method to store encrypted data | |||
2008 | |||||
556 | 7471792 | Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus | |||
557 | 7471791 | Method for countermeasure in an electronic component using a secret key algorithm | |||
558 | 7471790 | Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, and communication system | |||
559 | 7469048 | Methods for point compression for jacobians of hyperelliptic curves | |||
560 | 7457409 | System and method for performing secure communications in a wireless local area network | |||
561 | 7454016 | Data encryption system and method | |||
562 | 7447310 | Lean multiplication of multi-precision numbers over GF(2.sup.m) | |||
563 | 7436816 | Method and system for transmission-based billing of applications | |||
564 | 7434898 | Computer system, computer program, and addition method | |||
565 | 7434068 | Content protection in non-volatile storage devices | |||
566 | 7428305 | Generation of keyed integer permutations for message authentication codes | |||
567 | 7421587 | Detecting computer programs within packed computer files | |||
568 | 7421583 | System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof | |||
569 | 7418100 | Enciphering method | |||
570 | 7418098 | Data type preserving encryption | |||
571 | 7412607 | Methods and apparatus for customizing a rewritable storage medium | |||
572 | 7397916 | System and method for protecting computer software from a white box attack | |||
573 | 7382876 | Hash function constructions from expander graphs | |||
574 | 7369657 | Cryptography accelerator application program interface | |||
575 | 7363500 | Tunneled authentication protocol for preventing man-in-the-middle attacks | |||
576 | 7362866 | Method for determining encryption algorithm of secret communication based on mobile country codes | |||
577 | 7360238 | Method and system for authentication of a user | |||
578 | 7356845 | Method and apparatus for identification tagging documents in a computer system | |||
579 | 7353392 | Method and configuration for mutual authentication of two data processing units | |||
580 | 7349537 | Method for data encryption in an ethernet passive optical network | |||
581 | 7346582 | Electronic money, electronic use right, charging system, information processing apparatus, and reproducing method and reproduction control method of contents data | |||
582 | 7346161 | Method and apparatus for designing cipher logic, and a computer product | |||
583 | 7340606 | Digital certificates | |||
584 | 7333613 | Cyphering of the content of a memory external to a processor | |||
585 | 7330549 | Method of producing a cryptographic unit for an asymmetric cryptography system using a discrete logarithm function | |||
586 | 7325129 | Method for altering encryption status in a relational database in a continuous process | |||
587 | 7321659 | Simple universal hash for plaintext aware encryption | |||
588 | 7321658 | Padding application method ensuring security of cryptosystem and encryptor/decryptor | |||
589 | 7317794 | Enciphering and deciphering apparatus, and enciphering and deciphering method | |||
2007 | |||||
590 | 7313237 | Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet | |||
591 | 7313234 | Communication device, communication system, and algorithm selection method | |||
592 | 7305085 | Encryption apparatus and method, and decryption apparatus and method based on block encryption | |||
593 | 7299493 | Techniques for dynamically establishing and managing authentication and trust relationships | |||
594 | 7280657 | Data encryption and decryption system and method using merged ciphers | |||
595 | 7277540 | Arithmetic method and apparatus and crypto processing apparatus for performing multiple types of cryptography | |||
596 | 7263192 | Establishing an encrypted session | |||
597 | 7260216 | State machine representation for encrypting and decrypting a set of data values and method for protecting the same | |||
598 | 7257844 | System and method for enhanced piracy protection in a wireless personal communication device | |||
599 | 7257224 | Cryptographical pseudo-random number generation apparatus and program | |||
600 | 7245718 | Low bandwidth zero knowledge authentication protocol and device | |||
601 | 7236593 | Apparatus for encryption and decryption, capable of use in encryption and decryption of advanced encryption standard | |||
602 | 7236589 | Device for point compression for Jacobians of hyperelliptic curves | |||
603 | 7227946 | Automated permutation method and apparatus | |||
604 | 7225340 | Digital copying method and storage device for digital content | |||
605 | 7221763 | High throughput AES architecture | |||
606 | 7221760 | Information security using digital holography | |||
607 | 7218734 | Ring arithmetic method, system, and apparatus | |||
608 | 7209556 | Encryption apparatus and method, and decryption apparatus and method based on block encryption | |||
609 | 7203844 | Method and system for a recursive security protocol for digital copyright control | |||
610 | 7203834 | Method of updating encryption keys in a data communication system | |||
611 | 7200232 | Method and apparatus for symmetric-key decryption | |||
612 | 7200227 | Method and apparatus for facilitating efficient authenticated encryption | |||
613 | 7197528 | Jacobian group element adder | |||
614 | 7191336 | Method for embedding information in an image | |||
615 | 7184547 | Authenticating or signature method with reduced computations | |||
616 | 7184546 | Method based on an algorithm capable of being graphically implemented to be used for the generation of filtering of data sequences and crytographic applications | |||
617 | 7178030 | Electronically signing a document | |||
618 | 7174019 | Cipher generating device, cipher decoding device, cipher generating program, cipher decoding program, authentication system and electronic device | |||
619 | 7162031 | Method and device for cryptographically processing data | |||
2006 | |||||
620 | 7151830 | Method, system, program product and state machine representation for encrypting and decrypting a message | |||
621 | 7146006 | Method for improving a random number generator to make it more resistant against attacks by current measuring | |||
622 | 7142675 | Sequence generator and method of generating a pseudo random sequence | |||
623 | 7142669 | Circuit for generating hash values | |||
624 | 7136487 | System and method for automatically protecting private video content using embedded cryptographic security | |||
625 | 7136484 | Cryptosystems using commuting pairs in a monoid | |||
626 | 7127063 | Method and apparatus for computing a shared secret key | |||
627 | 7123717 | Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm | |||
628 | 7116782 | Encryption in a secure computerized gaming system | |||
629 | 7113592 | Method and device for loading input data into a program when performing an authentication | |||
630 | 7110986 | Automated banking machine system and method | |||
631 | 7110545 | Method and apparatus for symmetric-key encryption | |||
632 | 7110538 | Method for accelerating cryptographic operations on elliptic curves | |||
633 | 7107461 | Methods and apparatus for customizing a rewritable storage medium | |||
634 | 7106864 | Chaos-based data protection using time-discrete dynamical systems | |||
635 | 7103180 | Method of implementing the data encryption standard with reduced computation | |||
636 | 7095851 | Voice and data encryption method using a cryptographic key split combiner | |||
637 | 7085376 | Method and system for securely exchanging encryption key determination information | |||
638 | 7080804 | Hot-start navigation information distribution system | |||
639 | 7079650 | Computing method for elliptic curve cryptography | |||
640 | 7076656 | Methods and apparatus for providing efficient password-authenticated key exchange | |||
641 | 7050581 | Method for making secure one or several computer installations using a common secret key algorithm, use of the method and a computer system utilizing the method | |||
642 | 7050579 | Cryptographic methods and apparatus using word-wise montgomery multiplication | |||
643 | 7047408 | Secure mutual network authentication and key exchange protocol | |||
644 | 7043015 | Methods for point compression for Jacobians of hyperelliptic curves | |||
645 | 7003106 | Efficient method for multiplication over galois fields | |||
646 | 6993662 | Method and system for copy protection of displayed data content | |||
2005 | |||||
647 | 6968060 | Method for verifying the use of public keys generated by an on-board system | |||
648 | 6959091 | Cryptography private key storage and recovery method and apparatus | |||
649 | 6957333 | System and method for encrypted communications between electronic devices | |||
650 | 6956950 | Computer readable medium having a private key encryption program | |||
651 | 6956947 | Extraction of multiple single keys from a compressed key | |||
652 | 6956946 | Method and device for cryptographic processing with the aid of an elliptic curve on a computer | |||
653 | 6952770 | Method and apparatus for hardware platform identification with privacy protection | |||
654 | 6952477 | Fault intolerant cipher chaining | |||
655 | 6952476 | Verification of the private components of a public-key cryptographic system | |||
656 | 6950948 | Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections | |||
657 | 6948065 | Platform and method for securely transmitting an authorization secret | |||
658 | 6948064 | Method and apparatus for providing public key security control for a cryptographic processor | |||
659 | 6944300 | Method for migrating a base chip key from one computer system to another | |||
660 | 6941454 | System and method of sending and receiving secure data with a shared key | |||
661 | 6940980 | High security cryptosystem | |||
662 | 6940979 | Management of certificates for public key infrastructure | |||
663 | 6937728 | Verifiable anonymous channel | |||
664 | 6937726 | System and method for protecting data files by periodically refreshing a decryption key | |||
665 | 6934392 | Split-key key-agreement protocol | |||
666 | 6934389 | Method and apparatus for providing bus-encrypted copy protection key to an unsecured bus | |||
667 | 6931126 | Non malleable encryption method and apparatus using key-encryption keys and digital signature | |||
668 | 6928546 | Identity verification method using a central biometric authority | |||
669 | 6928162 | Method and system for manipulating and telescoping a hash function | |||
670 | 6925182 | Administration and utilization of private keys in a networked environment | |||
671 | 6922785 | Apparatus and a method for secure communications for network computers | |||
672 | 6912657 | Method and arrangement in a communication network | |||
673 | 6912656 | Method and apparatus for sending encrypted electronic mail through a distribution list exploder | |||
674 | 6912654 | Secret key generating method, encryption method, cryptographic communication method and cryptographic communication system | |||
675 | 6912285 | Mechanism for efficient private bulk messaging | |||
676 | 6912284 | Self-Authenticating cryptographic apparatus | |||
677 | 6909786 | Cryptographic trap door with timed lock and controlled escrow | |||
678 | 6909702 | Method and apparatus for out-of-band transmission of broadcast service option in a wireless communication system | |||
679 | 6898288 | Method and system for secure key exchange | |||
680 | 6898287 | Cryptographic system using chaotic dynamics | |||
681 | 6886098 | Systems and methods for compression of key sets having multiple keys | |||
682 | 6886096 | Identity-based encryption system | |||
683 | 6876745 | Method and apparatus for elliptic curve cryptography and recording medium therefore | |||
684 | 6873977 | Achieving buyer-seller anonymity for unsophisticated users under collusion amongst intermediaries | |||
685 | 6873706 | Processing apparatus, program, or system of secret information | |||
686 | 6868160 | System and method for providing secure sharing of electronic data | |||
687 | 6859533 | System and method for transferring the right to decode messages in a symmetric encoding scheme | |||
688 | 6851049 | Method and apparatus for facilitating secure anonymous email recipients | |||
689 | 6839839 | Public key distribution using an approximate linear function | |||
690 | 6839838 | Data management system, information processing apparatus, authentification management apparatus, method and storage medium | |||
691 | 6839437 | Method and apparatus for managing keys for cryptographic operations | |||
2004 | |||||
692 | 6834272 | Privacy preserving negotiation and computation | |||
693 | 6834112 | Secure distribution of private keys to multiple clients | |||
694 | 6816970 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | |||
695 | 6816966 | Techniques for securing data flow in internet multicasting | |||
696 | 6813358 | Method and system for timed-release cryptosystems | |||
697 | 6813357 | Exclusive key sharing method | |||
698 | 6804782 | Countermeasure to power attack and timing attack on cryptographic operations | |||
699 | 6801999 | Passive and active software objects containing bore resistant watermarking | |||
700 | 6798884 | Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium | |||
701 | 6789195 | Secure data processing method | |||
702 | 6788788 | Cryptographic communication method, encryption method, and cryptographic communication system | |||
703 | 6785388 | Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium | |||
704 | 6782100 | Accelerated finite field operations on an elliptic curve | |||
705 | 6779111 | Indirect public-key encryption | |||
706 | 6778666 | Cryptographic method using construction of elliptic curve cryptosystem | |||
707 | 6754820 | Multiple level access system | |||
708 | 6751318 | Method and apparatus for digital signature authentication | |||
709 | 6744894 | Data management system | |||
710 | 6741991 | Data management system | |||
711 | 6731755 | Split-key cryptographic system and method | |||
712 | 6724894 | Cryptographic device having reduced vulnerability to side-channel attack and method of operating same | |||
713 | 6721887 | Data copyright management system | |||
714 | 6721421 | Method for encrypting information represented as a numerical value | |||
715 | 6718468 | Method for associating a password with a secured public/private key pair | |||
716 | 6715073 | Secure server using public key registration and methods of operation | |||
717 | 6711263 | Secure distribution and protection of encryption key information | |||
718 | 6707801 | Method and apparatus for data transport in a wireless communication system | |||
719 | 6697488 | Practical non-malleable public-key cryptosystem | |||
720 | 6694025 | Method and apparatus for secure distribution of public/private key pairs | |||
721 | 6687822 | Method and system for providing translation certificates | |||
722 | 6683955 | Method for receiving a secured transmission of information through a plurality of frequency orthogonal subchannels | |||
723 | 6683953 | Encoding method, encoding-decoding apparatus, and code communications system | |||
724 | 6678821 | Method and system for restricting access to the private key of a user in a public key infrastructure | |||
2003 | |||||
725 | 6665405 | Cyclotomic polynomial construction of discrete logarithm cryptosystems over finite fields | |||
726 | 6658569 | Secret key cryptographic process for protecting a computer system against attacks by physical analysis | |||
727 | 6618483 | Elliptic curve encryption systems | |||
728 | 6614909 | Methods, systems, and circuits for generating keys for public key cryptosystems using parallel processing for modular operations of IC cards | |||
729 | 6603445 | Method and apparatus for factoring large numbers with optoelectronic devices | |||
730 | 6598163 | Flash mixing apparatus and method | |||
731 | 6587946 | Method and system for quorum controlled asymmetric proxy encryption | |||
732 | 6587563 | Cryptographic system using chaotic dynamics | |||
733 | 6564322 | Method and apparatus for watermarking with no perceptible trace | |||
734 | 6560336 | Apparatus for operating double vector and encrypting system including the same | |||
735 | 6553493 | Secure mapping and aliasing of private keys used in public key cryptography | |||
736 | 6550009 | Encryption system for distributing a common crypt key | |||
737 | 6530020 | Group oriented public key encryption and key management system | |||
738 | 6523116 | Secure personal information card database system | |||
739 | 6516415 | Device and method of maintaining a secret code within an integrated circuit package | |||
740 | 6507656 | Non malleable encryption apparatus and method | |||
2002 | |||||
741 | 6496929 | Generating RSA moduli including a predetermined portion | |||
742 | 6490352 | Cryptographic elliptic curve apparatus and method | |||
743 | 6480831 | Method and apparatus for securely transmitting keys from a postage metering apparatus to a remote data center | |||
744 | 6480606 | Elliptic curve encryption method and system | |||
745 | 6480605 | Encryption and decryption devices for public-key cryptosystems and recording medium with their processing programs recorded thereon | |||
746 | 6477254 | Network system using a threshold secret sharing method | |||
747 | 6463536 | Data copyright management system | |||
748 | 6459791 | Public key cryptography method | |||
749 | 6446205 | Cryptosystems with elliptic curves chosen by users | |||
750 | 6446051 | Document transfer systems | |||
751 | 6430292 | System and method for controlling disclosure time of information | |||
752 | 6412072 | Parasitically powered microprocessor capable of transmitting data over a single data line and ground | |||
753 | 6411715 | Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key | |||
754 | 6408389 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
755 | 6404890 | Generating RSA moduli including a predetermined portion | |||
756 | 6401204 | Process for cryptographic code management between a first computer unit and a second computer unit | |||
757 | 6396926 | Scheme for fast realization of encrytion, decryption and authentication | |||
758 | 6385318 | Encrypting method, deciphering method and certifying method | |||
759 | 6385317 | Method for providing a secure communication between two devices and application of this method | |||
760 | 6381699 | Leak-resistant cryptographic method and apparatus | |||
761 | 6381331 | Information sending system and method for sending encrypted information | |||
762 | 6378072 | Cryptographic system | |||
763 | 6377689 | Key transmission system | |||
764 | 6377688 | Cryptographic communication method and system | |||
765 | 6373946 | Communication security | |||
766 | 6370250 | Method of authentication and storage of private keys in a public key cryptography system (PKCS) | |||
767 | 6366673 | Method and device for executing a decrypting mechanism through calculating a standardized modular exponentiation for thwarting timing attacks | |||
768 | 6363480 | Ephemeral decryptability | |||
769 | 6351536 | Encryption network system and method | |||
770 | 6345098 | Method, system and apparatus for improved reliability in generating secret cryptographic variables | |||
771 | 6339828 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
772 | 6339824 | Method and apparatus for providing public key security control for a cryptographic processor | |||
773 | 6337909 | Generation of session keys for El Gamal-like protocols from low hamming weight integers | |||
2001 | |||||
774 | 6330674 | Use of biometrics as a methodology for defining components for ECC encryption | |||
775 | 6330332 | Prime number generation apparatus B-smoothness judgement apparatus and computer memory product | |||
776 | 6317833 | Practical mix-based election scheme | |||
777 | 6311270 | Method and apparatus for securing communication utilizing a security processor | |||
778 | 6307938 | Method, system and apparatus for generating self-validating prime numbers | |||
779 | 6307935 | Method and apparatus for fast elliptic encryption with direct embedding | |||
780 | 6304658 | Leak-resistant cryptographic method and apparatus | |||
781 | 6298137 | Ring-based public key cryptosystem method | |||
782 | 6292895 | Public key cryptosystem with roaming user capability | |||
783 | 6292892 | Apparatus and method for providing secured communications | |||
784 | 6289454 | Memory configuration which support multiple cryptographical algorithms | |||
785 | 6285760 | Method and apparatus for digital signature authentication | |||
786 | 6275936 | Decryption method and device, and access right authentication method and apparatus | |||
787 | 6272635 | Data copyright management system | |||
788 | 6263446 | Method and apparatus for secure distribution of authentication credentials to roaming users | |||
789 | 6259790 | Secret communication and authentication scheme based on public key cryptosystem using N-adic expansion | |||
790 | 6240187 | Key replacement in a public key cryptosystem | |||
791 | 6237097 | Robust efficient distributed RSA-key generation | |||
792 | 6230269 | Distributed authentication system and method | |||
793 | 6219789 | Microprocessor with coprocessing capabilities for secure transactions and quick clearing capabilities | |||
794 | 6215877 | Key management server, chat system terminal unit, chat system and recording medium | |||
795 | 6212277 | Elliptic curve transformation device, utilization device and utilization system | |||
796 | 6195433 | Private key validity and validation | |||
797 | 6192472 | Method and apparatus for the secure distributed storage and retrieval of information | |||
798 | 6185685 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | |||
799 | 6185546 | Apparatus and method for providing secured communications | |||
800 | 6170058 | Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use | |||
2000 | |||||
801 | 6154543 | Public key cryptosystem with roaming user capability | |||
802 | 6154541 | Method and apparatus for a robust high-speed cryptosystem | |||
803 | 6151676 | Administration and utilization of secret fresh random numbers in a networked environment | |||
804 | 6144740 | Method for designing public key cryptosystems against fault-based attacks with an implementation | |||
805 | 6141422 | Secure cryptographic multi-exponentiation method and coprocessor subsystem | |||
806 | 6141420 | Elliptic curve encryption systems | |||
807 | 6134431 | Personal station authentication system and authentication method | |||
808 | 6134325 | Key transmission system | |||
809 | 6125185 | System and method for encryption key generation | |||
810 | 6125182 | Cryptographic engine using logic and base conversions | |||
811 | 6111956 | Method for secure key distribution over a nonsecure communications network | |||
812 | 6111952 | Asymmetrical cryptographic communication method and portable object therefore | |||
813 | 6108419 | Differential fault analysis hardening apparatus and evaluation method | |||
814 | 6098056 | System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet | |||
815 | 6091819 | Accelerating public-key cryptography by precomputing randomly generated pairs | |||
816 | 6081893 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
817 | 6081793 | Method and system for secure computer moderated voting | |||
818 | 6081598 | Cryptographic system and method with fast decryption | |||
819 | 6081597 | Public key cryptosystem method and apparatus | |||
820 | 6078667 | Generating unique and unpredictable values | |||
821 | 6075864 | Method of establishing secure, digitally signed communications using an encryption key based on a blocking set cryptosystem | |||
822 | 6073125 | Token key distribution system controlled acceptance mail payment and evidencing system | |||
823 | 6072876 | Method and system for depositing private key used in RSA cryptosystem | |||
824 | 6069954 | Cryptographic data integrity with serial bit processing and pseudo-random generators | |||
825 | 6049610 | Method and apparatus for digital signature authentication | |||
826 | 6047072 | Method for secure key distribution over a nonsecure communications network | |||
827 | 6038317 | Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2.sup.l | |||
828 | 6035041 | Optimal-resilience, proactive, public-key cryptographic system and method | |||
829 | 6026163 | Distributed split-key cryptosystem and applications | |||
1999 | |||||
830 | 6005943 | Electronic identifiers for network terminal devices | |||
831 | 5999629 | Data encryption security module | |||
832 | 5991415 | Method and apparatus for protecting public key schemes from timing and fault attacks | |||
833 | 5991414 | Method and apparatus for the secure distributed storage and retrieval of information | |||
834 | 5987133 | Electronic authentication system | |||
835 | 5987124 | Method and apparatus for encrypting long blocks using a short-block encryption procedure | |||
836 | 5974151 | Public key cryptographic system having differential security levels | |||
837 | 5974141 | Data management system | |||
838 | 5960087 | Distributed garbage collection system and method | |||
839 | 5956408 | Apparatus and method for secure distribution of data | |||
840 | 5956407 | Public key cryptographic system having nested security levels | |||
841 | 5956406 | Method of setting up secure communications and associated encryption/decryption system | |||
842 | 5933503 | Controlled modular cryptography apparatus and method | |||
843 | 5915018 | Key management system for DVD copyright management | |||
844 | 5909491 | Method for sending a secure message in a telecommunications system | |||
845 | 5905799 | Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem | |||
846 | 5870470 | Method and apparatus for encrypting long blocks using a short-block encryption procedure | |||
847 | 5864667 | Method for safe communications | |||
1998 | |||||
848 | 5850450 | Method and apparatus for encryption key creation | |||
849 | 5850444 | Method and apparatus for encrypting radio traffic in a telecommunications network | |||
850 | 5850443 | Key management system for mixed-trust environments | |||
851 | 5848159 | Public key cryptographic apparatus and method | |||
852 | 5838792 | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem | |||
853 | 5835598 | Public key method of encoding data | |||
854 | 5832207 | Secure module with microprocessor and co-processor | |||
855 | 5832091 | Fingerprint controlled public key cryptographic system | |||
856 | 5825300 | Method of protected distribution of keying and certificate material | |||
857 | 5805712 | Apparatus and method for providing secured communications | |||
858 | 5805703 | Method and apparatus for digital signature authentication | |||
859 | 5799088 | Non-deterministic public key encrypton system | |||
860 | 5796840 | Apparatus and method for providing secured communications | |||
861 | 5796833 | Public key sterilization | |||
862 | 5790675 | Cryptographic communication process | |||
863 | 5768389 | Method and system for generation and management of secret key of public key cryptosystem | |||
864 | 5764768 | Blind encryption | |||
865 | 5761311 | Blind encryption | |||
866 | 5761310 | Communication system for messages enciphered according to an RSA-type procedure | |||
867 | 5761307 | Method for securing data in a telecommunications system | |||
868 | 5761306 | Key replacement in a public key cryptosystem | |||
869 | 5751813 | Use of an encryption server for encrypting messages | |||
870 | 5751808 | Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions | |||
871 | 5748735 | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography | |||
872 | 5745571 | Cryptographic communications method and system | |||
873 | 5740250 | Tame automorphism public key system | |||
874 | 5737425 | Cryptosystem employing worst-case difficult-to solve lattice problem | |||
875 | 5737424 | Method and system for secure distribution of protected data using elliptic curve systems | |||
876 | 5737420 | Method for secure data transmission between remote stations | |||
877 | 5737419 | Computer system for securing communications using split private key asymmetric cryptography | |||
878 | 5712800 | Broadcast key distribution apparatus and method using chinese remainder | |||
1997 | |||||
879 | 5680460 | Biometric controlled key generation | |||
880 | 5680458 | Root key compromise recovery | |||
881 | 5666419 | Encryption device and communication apparatus using same | |||
882 | 5663896 | Broadcast key distribution apparatus and method using Chinese Remainder | |||
883 | 5651066 | Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information | |||
884 | 5638445 | Blind encryption | |||
885 | 5625692 | Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing | |||
886 | 5604801 | Public key data communications system under control of a portable security device | |||
1996 | |||||
887 | 5588061 | System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem | |||
888 | 5586186 | Method and system for controlling unauthorized access to information distributed to users | |||
889 | 5581616 | Method and apparatus for digital signature authentication | |||
890 | 5577124 | Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions | |||
891 | 5577123 | Public-key cryptographic apparatus handling ciphertext by public-key | |||
892 | 5563950 | System and methods for data encryption using public key cryptography | |||
893 | 5559889 | System and methods for data encryption using public key cryptography | |||
894 | 5557678 | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem | |||
895 | 5552897 | Secure communication apparatus and method | |||
896 | 5541994 | Fingerprint controlled public key cryptographic system | |||
897 | 5539828 | Apparatus and method for providing secured communications | |||
898 | 5535276 | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography | |||
899 | 5499299 | Modular arithmetic operation system | |||
900 | 5497423 | Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication | |||
1995 | |||||
901 | 5463690 | Method and apparatus for public key exchange in a cryptographic system | |||
902 | 5442706 | Secure mobile storage | |||
1994 | |||||
903 | 5373560 | Partial modular reduction method | |||
904 | 5371794 | Method and apparatus for privacy and authentication in wireless networks | |||
905 | 5369708 | Fast server-aided computation system and method for modular exponentiation without revealing client's secret to auxiliary device | |||
906 | 5351298 | Cryptographic communication method and apparatus | |||
907 | 5351297 | Method of privacy communication using elliptic curves | |||
908 | 5297206 | Cryptographic method for communication and electronic signatures | |||
909 | 5295188 | Public key encryption and decryption circuitry and method | |||
910 | 5289542 | Caller identification system with encryption | |||
1993 | |||||
911 | 5274707 | Modular exponentiation and reduction device and method | |||
912 | 5272755 | Public key cryptosystem with an elliptic curve | |||
913 | 5271061 | Method and apparatus for public key exchange in a cryptographic system | |||
914 | 5241599 | Cryptographic protocol for secure communications | |||
915 | 5220604 | Method for performing group exclusion in hierarchical group structures | |||
916 | 5202921 | Method and apparatus for authenticating users of a communication system to each other | |||
917 | 5201000 | Method for generating public and private key pairs without using a passphrase | |||
918 | 5199070 | Method for generating a public key | |||
1992 | |||||
919 | 5159632 | Method and apparatus for public key exchange in a cryptographic system | |||
920 | 5146500 | Public key cryptographic system using elliptic curves over rings | |||
921 | 5144665 | Cryptographic communication method and system | |||
922 | 5142579 | Public key cryptographic system and method | |||
923 | 5142577 | Method and apparatus for authenticating messages | |||
924 | 5136642 | Cryptographic communication method and cryptographic communication device | |||
925 | 5124117 | Cryptographic key distribution method and system | |||
926 | 5121429 | Digital signal processing | |||
1991 | |||||
927 | 5073935 | Method for secure communication | |||
928 | 5073934 | Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key | |||
929 | 5068895 | Encryption and decryption methods using bit-length preservation decryptor | |||
930 | 5054066 | Error correcting public key cryptographic method and program | |||
931 | 5046094 | Server-aided computation method and distributed information processing unit | |||
1990 | |||||
932 | 4969190 | Encrypting system of data | |||
933 | 4964164 | RSA computation method for efficient batch processing | |||
934 | 4949379 | Process for encrypted information transmission | |||
935 | 4944007 | Public key diversification method | |||
936 | 4926480 | Card-computer moderated systems | |||
1989 | |||||
937 | 4888801 | Hierarchical key management system | |||
938 | 4870681 | Cryptographic method and cryptographic processor for carrying out the method | |||
939 | 4841570 | One-way transformation of information | |||
940 | 4807288 | Microprocessor intended particularly for executing the calculation algorithms of a public code encoding system | |||
1988 | |||||
941 | 4736423 | Technique for reducing RSA Crypto variable storage | |||
1987 | |||||
942 | 4703503 | Cryptographic system using pseudocomplements of vector Boolean algebra | |||
943 | 4658094 | Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large unsigned integer | |||
1986 | |||||
944 | 4633036 | Method and apparatus for use in public-key data encryption system | |||
945 | 4567600 | Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission | |||
1985 | |||||
946 | 4532638 | Method and apparatus for the exponentiation of large binary numbers in a residue class modulo N, particularly for encoding and decoding digitally-represented messages | |||
947 | 4514592 | Cryptosystem | |||
1984 | |||||
948 | 4471164 | Stream cipher operation using public key cryptosystem | |||
949 | 4424414 | Exponentiation cryptographic apparatus and method | |||
1983 | |||||
950 | 4405829 | Cryptographic communications system and method | |||
951 | 4399323 | Fast real-time public key cryptography | |||
1982 | |||||
952 | 4351982 | RSA Public-key data encryption system having large random prime number generating microprocessor or the like | |||
1981 | |||||
953 | 4306111 | Simple and effective public-key cryptosystem | |||
1980 | |||||
954 | 4218582 | Public key cryptographic apparatus and method | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |