СПИСОК патентов США - подгруппа МПК16 H04L9/28



Выделить слова в названиях патентов:


№ п/п Номер патента Название патента

2017

19602280System and method for content encryption in a key/value store
29600421Systems and methods for low-latency encrypted storage
39596293Content transmission device and network node
49591484Secure environment for subscriber device
59584315Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof
69548758Secure compressive sampling using codebook of sampling matrices
79544154Method of authenticating a device
89536102Privacy-protective data transfer

2016

99529465Secure interaction with input devices
109520996Ciphering data for transmission in a network
119515818Multi-block cryptographic operation
129509512Message digest generator
139509494Computer-implemented system and method for providing secure data processing in a cloud using discrete homomorphic encryption
149509414Encryption and decryption method and device
159483656Efficient and secure data storage utilizing a dispersed data storage system
169478011Method and system for processing of images
179473297Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
189461825Method and system for preventing revocation denial of service attacks
199460315Order-preserving encryption system, device, method, and program
209455831Order preserving encryption method
219449177General protocol for proactively secure computation
229438964Capturing video of an image with embedded code to access content
239436835Homomorphic encryption in computing systems and environments
249432190Computational systems and methods for double-encrypting data for subsequent anonymous storage
259430650Method for managing memory space in a secure non-volatile memory of a secure element
269426661Secure lock for mobile device
279425959Security variable scrambling
289425952Algebraic manipulation detection codes from algebraic curves
299419797System, processing device, computer program and method, to transparently encrypt and store data objects such that owners of the data object and permitted viewers are able to view decrypted data objects after entering user selected passwords
309407437Secure initialization vector generation
319401804Leakage resilient garbled circuit generation using reduced memory hardware token
329397830Method and apparatus for encrypting and decrypting data
339397826Encryption device and method for defending a physical attack
349389855Arithmetic device
359385867Cryptographic processing system, key generation device, encryption device, decryption device, key delegation device, cryptographic processing method, and cryptographic processing program
369384484Secure content distribution system
379379893Content consumption frustration
389374226Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer
399372975Secure recording and sharing system of voice memo
409369290Challenge-response authentication using a masked response value
419363076Implementing encrypted content in a game
429361617Variable-length cipher system and method
439356785Method and system for security enhancement for mobile communications
449356784Cryptic notes and related apparatus and methods
459350550Power management and security for wireless modules in "machine-to-machine" communications
469344278Secure data transfer using random ordering and random block sizing
479344277Mass serialization analytics
489344274Method and system for encrypting data
499336404Privacy-protective data transfer and storage
509331853Method and apparatus for increasing the output of a cryptographic system
519325498Performing AES encryption or decryption in multiple modes with a single instruction
529325497Power line based theft protection of electronic devices
539313028Method for fully homomorphic encryption using multivariate cryptography
549313027Protection of a calculation performed by an integrated circuit
559306747System and method for second factor authentication
569298939Privacy-protective data transfer
579298932Matrix code for encryption, storage, and transmission of data
589294915Localized network authentication and security using tamper-resistant keys
599294277Audio encryption systems and methods
609292697Matrix code for encryption, storage, and transmission of data
619281945Offline methods for authentication in a client/server authentication system
629277406Methods and system for secure communication between an RFID tag and a reader
639276745Preserving image privacy when manipulated by cloud services
649276744Image data processing device and image data processing program
659275202Data processing method
669270462Method and system for conducting high speed, symmetric stream cipher encryption
679270274FPGA configuration data scrambling using input multiplexers
689258303Method of providing real-time secure communication between end points in a network
699240885Cryptographic processing apparatus, cryptographic processing method, and computer program therefor
709237014Partial CipherText updates using variable-length segments delineated by pattern matching and encrypted by fixed-length blocks
719231922Cloud storage system, data encryption processing device and data encryption method in cloud storage system
729231768Utilizing a deterministic all or nothing transformation in a dispersed storage network
739229823Storage and retrieval of dispersed storage network access information

2015

749226043Displaying content associated with code embedded in an image
759215069Methods and apparatus for device authentication with one-time credentials
769215067Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
779209979Secure network cloud architecture
789209978Methods and apparatus to measure exposure to streaming media
799209973Delegate authorization in cloud-based storage system
809197412Low-complexity electronic circuit protected by customized masking
819191207Anti-spying encrypted keyboard
829184918Trusted hardware for attesting to authenticity in a cloud environment
839172538Secure lock for mobile device
849167314Embedding information in an image
859166893Methods, apparatus and systems for monitoring locations of data within a network service
869166789Cryptographic processing apparatus
879166785Cryptography processing device and cryptography processing method
889160522System and method for verifying the identity of an individual by employing biometric data features associated with the individual
899154300Method and apparatus for determining joint randomness
909143326Method and system for encrypting data
919143325Masking with shared random bits
929143324Secure messaging
939130918System and method for automatically verifying storage of redundant contents into communication equipments, by data comparison
949130752Tamper-resistant coating for an integrated circuit
959124417Computation of garbled tables in garbled circuit
969118481Method and system for efficiently generating a high quality pseudo-random sequence of numbers with extraordinarily long periodicity
979118463Distributed single sign on technologies including privacy protection and proactive updating
989112886Method and system for providing centralized data field encryption, and distributed storage and retrieval
999112699System, processing device, computer program and method, to tranparently encrypt and store data objects such that owners of the data object and permitted viewers are able to view decrypted data objects after entering user selected passwords
1009112698Cryptographic device and method for data encryption with per-round combined operations
1019106421Securing communications over a first communication link with encryption managed by a second communication link
1029106366Distributing data to multiple clients from server
1039100188Hardware-based root of trust for cloud environments
1049100185Encryption processing apparatus and method
1059100184Instructions processors, methods, and systems to process BLAKE secure hashing algorithm
1069100183Computer program product and method for order preserving symbol based encryption
1079094204Image encryption system and image decryption system
1089088553Transmitting message prior to transmitting encapsulated packets to assist link partner in decapsulating packets
1099083528Authentication of encrypted data blocks
1109083527Using mobile data to establish a shared secret in second-factor authentication
1119083526Fully homomorphic encryption
1129082279Method for securely dematerializing the transfer of evidence in data-stream production systems, in particular video-surveillance systems
1139077856Method for local conditional access for mobile equipments
1149065654Parallel encryption/decryption
1159065631Integrated cryptographic module providing confidentiality and integrity
1169064370Method for conducting a sports technology reality television show
1179064229Real-time asset tracking using discovery services
1189064135Hardware implemented key management system and method
1199059852Validating a user's identity utilizing information embedded in a image file
1209059851Method and computer program product for order preserving symbol based encryption
1219059838Encryption algorithm with randomized buffer
1229058507Signal processor with an encrypting or decrypting device in a memory system
1239055349Displaying video retrieved from embedded code in a still image
1249054872Secure lookup
1259054871Physical key-protected one time pad
1269054870Information security based on eigendecomposition
1279049021Method for determining the cofactor of an elliptic curve, corresponding electronic component and computer program product
1289047461Computer-implemented method for replacing a data string
1299047167Calculating the modular inverses of a value
1309037863Terminal device, server device, content recording control system, recording method, and recording permission control method
1319031229Computer-implemented system and method for providing data privacy in a cloud using discrete homomorphic encryption
1329031228Systems and methods for implementing block cipher algorithms on attacker-controlled systems
1339025765Data security
1349020148Protection of registers against unilateral disturbances
1359015819Method and system for single sign-on
1369014370High performance hardware-based execution unit for performing C2 block cipher encryption/decryption
1379002000Method for conversion of a first encryption into a second encryption
1389001999Updating stored passwords
1398983061Method and apparatus for cryptographically processing data
1408972745Secure data handling in a computer system
1418958550Encryption operation with real data rounds, dummy data rounds, and delay periods
1428953785Instruction set for SKEIN256 SHA3 algorithm on a 128-bit processor
1438948376Format-preserving encryption via rotating block encryption
1448942373Data encryption and decryption method and apparatus
1458942372Method and device for identifying objects
1468938068Functional encryption applied system, information output apparatus, information processing apparatus, encryption protocol execution method, information output method, information processing method, program and recording medium
1478938067Format preserving encryption methods for data strings with constraints
1488935541Method and apparatus for encrypting and processing data in flash translation layer
1498934624Decoupling rights in a digital content unit from download
1508929542Cryptographic processing system, key generation device, key delegation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program

2014

1518924448Arithmetic device, method, and program product
1528924303Method and system for obtaining feedback for a product
1538917871Asymmetrical chaotic encryption
1548913740Method and apparatus for generating an Advanced Encryption Standard (AES) key schedule
1558913739Method for scalar multiplication in elliptic curve groups over prime fields for side-channel attack resistant cryptosystems
1568908860Information processing device, system, and method, including hash value replacement processing and signature verification processing as part of encrypted content playback propriety determination processing
1578903083Fast evaluation of many polynomials with small coefficients on the same point
1588891756Collision-resistant elliptic curve hash functions
1598886926Single-pass data compression and encryption
1608886925Protecting enterprise data through policy-based encryption of message attachments
1618886711File system adapted for use with a dispersed data storage network
1628885817Nonlinear feedback shift register and method for nonlinear signature formation
1638879735Shared secret arrangements and optical data transfer
1648861717Verification device, secret information restoration device, verification method, program, and secret sharing system
1658856546Speed up secure hash algorithm (SHA) using single instruction multiple data (SIMD) architectures
1668856510Method for joining user domain and method for exchanging information in user domain
1678855297Device and authentication method therefor
1688850213Method for verifying an electronic signature and data processing device
1698842840Demand based encryption and key generation and distribution systems and methods
1708842824Encryption processing circuit and decryption processing circuit, methods thereof, and programs thereof
1718838997Instruction set for message scheduling of SHA256 algorithm
1728837719Cryptographic methods and devices for pseudo-random generation, encrypting data, and cryptographically hashing a message
1738837715Method and apparatus for secure iterative processing and adaptive filtering
1748831213Methods and apparatus for protecting digital content
1758819410Private electronic information exchange
1768811611Encryption/decryption of digital data using related, but independent keys
1778811607Processing context information
1788804953Extensive ciphertext feedback
1798804950Methods and apparatus for producing a hash value based on a hash function
1808793500Hybrid signature scheme
1818793484Electronic device with message encryption function and message encryption method
1828787583Systems and methods for distributing and securing data
1838787563Data converter, data conversion method and program
1848782437Content protection using block reordering
1858781110Unified system architecture for elliptic-curve cryptography
1868775813ElGamal signature schemes
1878769310Encrypting data objects to back-up
1888769282Localized network authentication and security using tamper-resistant keys
1898767955Protection of a modular exponentiation calculation by multiplication by a random quantity
1908762743Encrypting data objects to back-up
1918761389Memory
1928756410Polynomial evaluation delegation
1938751822Cryptography using quasigroups
1948750707System and method for establishing secure communications between transceivers in undersea optical communication systems
1958750500Multi-dimensional montgomery ladders for elliptic curves
1968744074Method and device for countering fault attacks
1978744072Exponentiation method resistant against side-channel and safe-error attacks
1988744071Dispersed data storage system data encryption and encoding
1998731187Computing genus-2 curves using general isogenies
2008726030Terminal device, server device, content recording control system, recording method, and recording permission control method
2018726029Cryptographic processing of content
2028718280Securing keys of a cipher using properties of the cipher process
2038718276Cryptography on a elliptical curve
2048713315Content distribution system, mobile communication terminal device, and computer readable medium
2058712054Method and system for establishing enhanced key when terminal moves to enhanced universal terminal radio access network (UTRAN)
2068712038Cryptography on a simplified elliptical curve
2078712037Data encoding and decoding apparatus and method thereof for verifying data integrity
2088712035Online data conversion technique using a sliding window
2098705729Audio content protection
2108700921Fault-resistant exponentiation algorithm
2118700916Utilizing physically unclonable functions to derive device specific keying material for protection of information
2128694789System and method for generating a non-repudiatable record of a data stream
2138693684Method and apparatus for computing a shared secret key
2148688998Resilent cryptographic scheme
2158687802Method and system for accelerating the deterministic enciphering of data in a small domain
2168683206System and method of authenticating multiple files using a detached digital signature
2178683189On-chip security method and apparatus
2188681975Encryption method and apparatus using composition of ciphers
2198677152Method and apparatus for encrypting media programs for later purchase and viewing
2208675867Key generation algorithm using secret polynomial over finite ring and transformation
2218667274System and method for WORM data storage
2228666064Endecryptor capable of performing parallel processing and encryption/decryption method thereof
2238660263Power analysis attack countermeasure for the ECDSA
2248660262Method and device for generating random wait states
2258649508System and method for implementing elliptic curve scalar multiplication in cryptography
2268644501Paired carrier and pivot steganographic objects for stateful data layering
2278638926Sharing a secret with modular inverses
2288635635Factoring middleware for anti-piracy
2298635320Air conditioning management apparatus and air conditioning management system
2308634550Architecture and instruction set for implementing advanced encryption standard (AES)
2318631237Simplified login for mobile devices
2328627073Adaptive certificate distribution mechanism in vehicular networks using forward error correcting codes
2338625780Reduction of side-channel information by interacting crypto blocks

2013

2348619980Information generation apparatus, method, program, and recording medium for deriving a decryption key from another decryption key
2358615078Method and apparatus for processing F-function in seed encryption system
2368612771Verifying authenticity of playback device
2378607347Network stream scanning facility
2388607343Ticket-based personalization
2398594322Encoding/decoding apparatus
2408589700Data whitening for writing and reading data to and from a non-volatile memory
2418589699Storage media device and recording apparatus
2428584235Fuzzy whitelisting anti-malware systems and methods
2438582777Method and system for lightweight key distribution in a wireless network
2448582758Apparatus and a method for calculating a multiple of a point an elliptic curve
2458578166System and method for authentication, data transfer, and protection against phishing
2468577037Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
2478577030Cryptographic processing system, key generation device, key delegation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program
2488577023Encryption processing method, apparatus, and computer program utilizing different types of S-boxes
2498566607Cryptography methods and apparatus used with a processor
2508560847Light access authentication method and system
2518553887Method for generating dynamic group key
2528553877Substitution table masking for cryptographic processes
2538549310Method and apparatus for secure measurement certification
2548549305Steganographic method and device
2558548165Method of compressing a cryptographic value
2568548161Crytographically transforming data text
2578543630Exponentiation calculation apparatus and method for calculating square root in finite extension field
2588542103Radio frequency identification reading by using error correcting codes on sets of tags
2598538014Fast computation of one-way hash sequences
2608533807Methods for accessing content based on a session ticket
2618526614Method to manage members of at least one group of decoders having access to broadcast data
2628522015Authentication of binaries in memory with proxy code execution
2638520846Method and device for key generation
2648515059Cryptographic processor with dynamic update of encryption state
2658515057Method and device for executing crytographic calculation
2668510824Method, system, subscriber equipment and multi-media server for digital copyright protection
2678504845Protecting states of a cryptographic process using group automorphisms
2688503679Short message encryption
2698495390System and method for data obfuscation based on discrete logarithm properties
2708488781Method for implementing symmetric key encryption algorithm against power analysis attacks
2718484485Encryption device and encryption system
2728484475Data transmission method, and tachograph system
2738479270Method for allocating authorization key identifier for wireless portable internet system
2748477933Cryptographic algorithm fault protections
2758467533One-time-pad encryption with key ID and offset for starting point
2768467526Key evolution method and system of block ciphering
2778467525Steganographic method and device
2788462943Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel
2798462939RNS-based cryptographic system and method
2808457302Access-controlled data storage medium
2818452005Unicode-compatible encipherment
2828442219Public key cryptographic methods and systems
2838438205Exponentiation calculation apparatus and method for calculating square root in finite extension field
2848437470Method and system for block cipher encryption
2858433927Cryptographically-enabled privileged mode execution
2868433899System and method for authenticating data using incompatible digest functions
2878428251System and method for stream/block cipher with internal random states
2888422674Application-specific secret generation
2898422667Method and apparatus to facilitate transmission of an encrypted rolling code
2908416949Actor node, sensor node, coverage block change method, parameter change method, program, and information processing system
2918406423Multi-bit cryptographically secure encryptor for M-ary spectral phase encoder optical code division multiple access
2928406422Cryptographic module management apparatus, method, and program
2938406421Method and system for multi-level secure personal profile management and access control to the enterprise multi-modal communication environment in heterogeneous convergent communication networks
2948396208Memory system with in stream data encryption/decryption and error correction
2958386803System and method for data obfuscation based on discrete logarithm properties
2968386791Secure data processing method based particularly on a cryptographic algorithm
2978386790Method of using ECDSA with winternitz one time signature
2988385541Method of performing elliptic polynomial cryptography with elliptic polynomial hopping
2998374343DES hardware throughput for short operations
3008374342Scalar multiplier and scalar multiplication program
3018374340Method for secure transmission of data
3028370642Cryptographic processing apparatus
3038364964Registering client devices with a registration server
3048363839Image forming apparatus
3058363826Scrambler, scramble processing method, and program
3068355499Parallel encryption/decryption
3078353018Automatic local listing owner authentication system
3088351601Elliptic polynomial cryptography with secret key embedding
3098351599Cryptographic device for fast session switching
3108345862Method of sharing a strong secret between two parties, one of whom has little processing power
3118345315Method and device for making documents secure using unique imprint derived from unique marking variations

2012

3128341429Data transfer device
3138335314Adaptive and secure modular connection
3148332635Updateable secure kernel extensions
3158331559Diffused data encryption/decryption processing method
3168331558Method of cipher block chaining using elliptic curve cryptography
3178331557Power analysis attack countermeasure for the ECDSA
3188331556Asymmetrical method of encryption or signature verification
3198325913System and method of authentication
3208320558Encryption of synchronization information
3218320557Cryptographic system including a mixed radix number generator with chosen statistical artifacts
3228295478Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure
3238291235Method and system for controlling access of clients and users to a print server
3248291229System and method for digital signatures and authentication
3258291221Method and apparatus for implementing a novel one-way hash function on highly constrained devices such as RFID tags
3268290147Systems and methods for efficiently creating digests of digital data
3278290145Transition between masked representations of a value during cryptographic calculations
3288281155Content protection using block reordering
3298280059Method, system and device for generating group key
3308275126Apparatus and method for hash cryptography
3318275125Method for designing a secure hash function and a system thereof
3328266421Private electronic information exchange
3338261098Method and apparatus for encrypting and processing data in flash translation layer
3348259932Computing modular polynomials modulo large primes
3358250665Digital Broadcasting system and method of processing data in digital broadcasting system
3368233620Key recovery mechanism for cryptographic systems
3378233614Integer division method secure against covert channel attacks
3388229114Identity-based key generating methods and devices
3398229110Pipelined packet encryption and decryption using counter mode with cipher-block chaining message authentication code protocol
3408225391System and method for improving restrictiveness on accessing software applications
3418213602Method and system for encrypting and decrypting a transport stream using multiple algorithms
3428208632Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
3438204214Method and system for generating data transaction ID
3448204213System and method for performing a similarity measure of anonymized data
3458194854Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation
3468189770Tweakable block encryption apparatus, method, and program
3478189768Secure messaging
3488184806Table masking for resistance to power analysis attacks
3498184804Hash function using a piling-up process
3508180046Method for making secure an electronic entity with encrypted access
3518170204Method and system for extending advanced encryption standard (AES) operations for enhanced security
3528165286Combination white box/black box cryptographic processes and apparatus
3538161285Protocol-Independent remote attestation and sealing
3548160245Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting
3558160242Efficient implementation of arithmetical secure hash techniques
3568144864Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems
3578139763Randomized RSA-based cryptographic exponentiation resistant to side channel and fault attacks
3588135132Method and system for secure storage, transmission and control of cryptographic keys
3598135129Protection of a modular exponentiation calculation performed by an integrated circuit
3608130964Systems and methods for identity-based encryption and related cryptographic techniques
3618130962Content protection method and apparatus
3628130946Iterative symmetric key ciphers with keyed S-boxes using modular exponentiation
3638130944Digital encrypted time capsule
3648111827Cryptographic processing apparatus and cryptographic processing method
3658107622System and method to preclude message modification in data authentication systems through efficent use of feedback in cryptographic functions
3668107620Simple and efficient one-pass authenticated encryption scheme
3678102997Processor for executing an AES-type algorithm
3688102996Scrambler, descrambler and method, and disc apparatus
3698098816Apparatus and method for evaluating a cipher structure's resistance to cryptanalysis
3708094811Data encryption device and data encryption method
3718090099Computer-readable recording medium recording program and apparatus for encryption/decryption, apparatus for multiplication in extension field
3728090098Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher

2011

3738086867Secure identity and privilege system
3748086864Low power HMAC encryption apparatus
3758086854Content protection information using family of quadratic multivariate polynomial maps
3768085931Computation method, computing device and computer program
3778079071Methods for accessing content based on a session ticket
3788077864Apparatus for computing streamcipher TSC-4
3798077863Secret sharing apparatus, method, and program
3808074068Secret sharing device, method, and program
3818059964QKD system with common-mode dithering
3828054967Computer system and computer program executing encryption or decryption
3838050410Distributed encryption methods and systems
3848050404Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel
3858036378System and method of authentication
3868032762Process, circuits, devices, and systems for encryption and decryption and other purposes, and process making
3878028157On-chip security method and apparatus
3888027474Method and system for secure data aggregation in wireless sensor networks
3898027466Power analysis attack countermeasure for the ECDSA
3908014521Cryptographic computation method, cryptographic system, and computer program
3918014520Exponentiation ladder for cryptography
3928010801Multi-data rate security architecture for network security
3938009828Integrated shuffle validity proving device, proof integrating device, integrated shuffle validity verifying device, and mix net system
3948009827Encryption processing method and encryption processing device
3958006090System and method for combining user and platform authentication in negotiated channel security protocols
3968005210Modulus scaling for elliptic-curve cryptography
3978005209Invariance based concurrent error detection for the advanced encryption standard
3988001385Method and apparatus for flash updates with secure flash
3998001381Method and system for mutual authentication of nodes in a wireless communication network
4008001374Memory encryption for digital video
4017996679System and method for performing a trust-preserving migration of data objects from a source to a target
4027995752Method for accelerating cryptographic operations on elliptic curves
4037995749Cryptographic system configured for extending a repetition period of a random sequence
4047991162Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields
4057987367Method and apparatus for key agreement between devices using polynomial ring
4067986779Efficient elliptic-curve cryptography based on primality of the order of the ECC-group
4077983414Protected cryptographic calculation
4087978846Scale-invariant barrett reduction for elliptic-curve cyrptography
4097974405Method and device for calculating a function from a large number of inputs
4107970128Systems and methods for efficient generation of hash values of varying bit widths
4117962753Method and a circuit for SHA operation with power saved
4127961877Factoring based modular exponentiation
4137961872Flexible hardware architecture for ECC/HECC based cryptography
4147961871Encryption process, encryption device, and computer-readable medium storing encryption program
4157957527Cryptographic processing apparatus
4167953221Method for processing multiple operations
4177949130Architecture and instruction set for implementing advanced encryption standard (AES)
4187949129Method and apparatus for facilitating efficient authenticated encryption
4197949128Method and device for the encryption and decryption of data
4207945044Method and system for performing an untraceable secret matching
4217940928Systems and methods for protecting data secrecy and integrity
4227940927Information security device and elliptic curve operating device
4237940926Cooperative encoding of data by pluralities of parties
4247936869Verifying digital signature based on shared knowledge
4257933905Universal-hash-function-family calculation unit and shared-key generation system
4267930556Fingerprint system and method for access control
4277929689Call signs
4287926100Method for preventing unauthorized connection in network system
4297908472Secure sockets layer cut through architecture
4307907722Protection against power analysis attacks
4317904721Digital certificates
4327890759Connection assistance apparatus and gateway apparatus
4337886162Cryptographic secure program overlays
4347886143Multi-data rate cryptography architecture for network security
4357885639Method and apparatus for authenticating a wireless access point
4367882355Encryption/decryption methods and devices utilizing the same
4377881473Quantum key distribution system and method
4387881465Circuit and method for calculating a logic combination of two encrypted input operands
4397876893Logic circuit and method for calculating an encrypted result operand
4407873161Small hardware implementation of the subbyte function of rijndael
4417870393Steganographic method and device
4427869590Method and system for hardware accelerator for implementing f9 integrity algorithm in WCDMA compliant handsets
4437864952Data processing systems with format-preserving encryption and decryption engines
4447864951Scalar multiplication method with inherent countermeasures

2010

4457861312MP3 player with digital rights management
4467861306Method and system for limiting the use of user-specific software features
4477860252Circuit security
4487860242Method of securely implementing a cryptography algorithm of the RSA type, and a corresponding component
4497856101Method for elliptic curve scalar multiplication
4507856099Secure data transmission between two modules
4517853805Anti-tamper system
4527853014Ring arithmetic method, system, and apparatus
4537853013Cryptographic method and system for encrypting input data
4547853011Methods and apparatus for monitoring the integrity of a quantum channel supporting multi-quanta pulse transmission
4557849318Method for session security
4567848515Encryption protection method
4577848514Table masking for resistance to power analysis attacks
4587840000High performance programmable cryptography system
4597836515System and method for enhanced piracy protection in a wireless personal communication device
4607836310Security system that uses indirect password-based encryption
4617835517Encryption processing apparatus, encryption processing method, and computer program
4627831039AES encryption circuitry with CCM
4637822204Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, transmission/reception system, and communication system
4647809133Randomized modular reduction method and hardware therefor
4657809132Implementations of AES algorithm for reducing hardware with improved efficiency
4667801298Apparatus and method for detecting a potential attack on a cryptographic calculation
4677796750Method for making secure an electronic entity with encrypted access
4687792288Communication system using quantum cryptography and comprising switching stations
4697792286Signature generation device and signature verification device
4707787619Method and apparatus for secure key management using multi-threshold secret sharing
4717783040Encryption in a secure computerized gaming system
4727779272Hardware cryptographic engine and encryption method
4737778415Substitution cipher text-encoding and un-encoding software and method
4747778414Encryption method based on factorization
4757769165Semi-public white-box cipher
4767769164Printing apparatus
4777764789Key bit stream generation
4787764788Methods and apparatus for performing authentication and decryption
4797764786Protection of a DES algorithm
4807764785Method for communicating securely over an insecure communication channel
4817761712Steganographic method and device
4827760874Method and system for implementing FI function in KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets
4837757091Method and apparatus for the creation of a self-authenticating document
4847752449System and method for generating a non-repudiatable record of a data stream
4857751567Local authentication of mobile subscribers outside their home systems
4867742595Cryptographic method protected against covert channel type attacks
4877734048Cryptographic system using chaotic dynamics
4887730319Provisional signature schemes
4897724897Program converter, encrypting device, and encrypting method
4907724896Method for transmitting messages between an emitter and at least on receiver and system for implementing said method
4917720228Modulator autocalibration methods for quantum key distribution
4927720219Apparatus and method for implementing a hash algorithm word buffer
4937706528Prime calculating apparatus, key issuing system, and prime calculation method
4947702898Method for authenticating and verifying SMS communications
4957702100Key generation for advanced encryption standard (AES) Decryption and the like
4967702099Multipoint synchronous diffused encryption/decryption method
4977702098Elliptic curve point octupling for weighted projective coordinates
4987697688Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
4997697683Cryptography-processing method, cryptography-processing apparatus and computer program
5007697681Parallelizable integrity-aware encryption technique
5017697680Traceable method and system for encrypting and/or decrypting data, and recording media for implementing the method
5027693277Generating digital signatures using ephemeral cryptographic key
5037688972Method and system for implementing FO function in KASUMI algorithm for accelerating cryptography in GSM (global system for mobile communication)GPRS (general packet radio service)edge(enhanced data rate for GSM evolution) compliant handsets
5047684563Apparatus and method for implementing a unified hash algorithm pipeline
5057680270System for elliptic curve encryption using multiple points on an elliptic curve derived from scalar multiplication
5067680268Elliptic curve point octupling using single instruction multiple data processing
5077676040Changing encryption key of encrypted data
5087676037Cryptographic method capable of protecting elliptic curve code from side channel attacks
5097664957Digital signatures including identity-based aggregate signatures
5107664710Remote authentication of two dimensional barcoded indicia
5117664258Randomized sparse formats for efficient and secure computation on elliptic curves
5127661011Method and apparatus for a variable processing period in an integrated circuit
5137646868Method for steganographic cryptography

2009

5147634091System and method of hiding cryptographic private keys
5157634085Identity-based-encryption system with partial attribute matching
5167634084Prime calculation device, method, and key issuing system
5177623658Method and system for implementing the A5/3 encryption algorithm for GSM and EDGE compliant handsets
5187617527Architecture for virtual private networks
5197614077Persistent access control of protected content
5207606361Sending a message securely over an insecure channel
5217602905Processes, circuits, devices, and systems for encryption and decryption and other purposes, and processes of making
5227602904Order invariant fuzzy commitment system
5237600134Theft deterrence using trusted platform module authorization
5247599490Method and apparatus for data encryption
5257596703Hidden data backup and retrieval for a secure device
5267593529Scramble methods and apparatus for packetized digital video signal in conditional access system
5277593525Patternless encryption and decryption system and method
5287590235Reduction calculations in elliptic curve cryptography
5297587605Cryptographic pairing-based short signature generation and verification
5307580519Triple DES gigabit/s performance using single DES engine
5317577255Proxy method and system for secure wireless administration of managed entities
5327574600System and method for combining user and platform authentication in negotiated channel security protocols
5337571324Method and device for anonymous signature with a shared private key
5347567668Calculating unit and method for performing an arithmetic operation with encrypted operands
5357565537Secure key exchange with mutual authentication
5367564970Exponential data transform to enhance security
5377551737Cryptographic keys using random numbers instead of random primes
5387546430Method of address space layout randomization for windows operating systems
5397539868Run-time firmware authentication
5407539305Schryption method and device
5417536011Tamper-proof elliptic encryption with private key
5427532726Encryption/decryption device and method, encryption device and method, decryption device and method, and transmission/reception apparatus
5437532721Implementation of a switch-box using a subfield method
5447532720Utilizing SIMD instructions within montgomery multiplication
5457530114Content delivery method and content delivery system
5467529939Method of and apparatus for transferring data
5477529365Device and method of applying check bit to encrypt instruction for protection
5487512800Key management technique for establishing a secure channel
5497512239Protection key for hardware and information management system
5507512233Method and apparatus for computing a shared secret key
5517512231Computation method for modular exponentiation operation in decryption or signature generation
5527508936Hardware accelerator for elliptic curve cryptography
5537499542Device and method for encrypting and decrypting a block of data
5547490240Electronically signing a document
5557487364Method to store encrypted data

2008

5567471792Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus
5577471791Method for countermeasure in an electronic component using a secret key algorithm
5587471790Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, and communication system
5597469048Methods for point compression for jacobians of hyperelliptic curves
5607457409System and method for performing secure communications in a wireless local area network
5617454016Data encryption system and method
5627447310Lean multiplication of multi-precision numbers over GF(2.sup.m)
5637436816Method and system for transmission-based billing of applications
5647434898Computer system, computer program, and addition method
5657434068Content protection in non-volatile storage devices
5667428305Generation of keyed integer permutations for message authentication codes
5677421587Detecting computer programs within packed computer files
5687421583System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof
5697418100Enciphering method
5707418098Data type preserving encryption
5717412607Methods and apparatus for customizing a rewritable storage medium
5727397916System and method for protecting computer software from a white box attack
5737382876Hash function constructions from expander graphs
5747369657Cryptography accelerator application program interface
5757363500Tunneled authentication protocol for preventing man-in-the-middle attacks
5767362866Method for determining encryption algorithm of secret communication based on mobile country codes
5777360238Method and system for authentication of a user
5787356845Method and apparatus for identification tagging documents in a computer system
5797353392Method and configuration for mutual authentication of two data processing units
5807349537Method for data encryption in an ethernet passive optical network
5817346582Electronic money, electronic use right, charging system, information processing apparatus, and reproducing method and reproduction control method of contents data
5827346161Method and apparatus for designing cipher logic, and a computer product
5837340606Digital certificates
5847333613Cyphering of the content of a memory external to a processor
5857330549Method of producing a cryptographic unit for an asymmetric cryptography system using a discrete logarithm function
5867325129Method for altering encryption status in a relational database in a continuous process
5877321659Simple universal hash for plaintext aware encryption
5887321658Padding application method ensuring security of cryptosystem and encryptor/decryptor
5897317794Enciphering and deciphering apparatus, and enciphering and deciphering method

2007

5907313237Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet
5917313234Communication device, communication system, and algorithm selection method
5927305085Encryption apparatus and method, and decryption apparatus and method based on block encryption
5937299493Techniques for dynamically establishing and managing authentication and trust relationships
5947280657Data encryption and decryption system and method using merged ciphers
5957277540Arithmetic method and apparatus and crypto processing apparatus for performing multiple types of cryptography
5967263192Establishing an encrypted session
5977260216State machine representation for encrypting and decrypting a set of data values and method for protecting the same
5987257844System and method for enhanced piracy protection in a wireless personal communication device
5997257224Cryptographical pseudo-random number generation apparatus and program
6007245718Low bandwidth zero knowledge authentication protocol and device
6017236593Apparatus for encryption and decryption, capable of use in encryption and decryption of advanced encryption standard
6027236589Device for point compression for Jacobians of hyperelliptic curves
6037227946Automated permutation method and apparatus
6047225340Digital copying method and storage device for digital content
6057221763High throughput AES architecture
6067221760Information security using digital holography
6077218734Ring arithmetic method, system, and apparatus
6087209556Encryption apparatus and method, and decryption apparatus and method based on block encryption
6097203844Method and system for a recursive security protocol for digital copyright control
6107203834Method of updating encryption keys in a data communication system
6117200232Method and apparatus for symmetric-key decryption
6127200227Method and apparatus for facilitating efficient authenticated encryption
6137197528Jacobian group element adder
6147191336Method for embedding information in an image
6157184547Authenticating or signature method with reduced computations
6167184546Method based on an algorithm capable of being graphically implemented to be used for the generation of filtering of data sequences and crytographic applications
6177178030Electronically signing a document
6187174019Cipher generating device, cipher decoding device, cipher generating program, cipher decoding program, authentication system and electronic device
6197162031Method and device for cryptographically processing data

2006

6207151830Method, system, program product and state machine representation for encrypting and decrypting a message
6217146006Method for improving a random number generator to make it more resistant against attacks by current measuring
6227142675Sequence generator and method of generating a pseudo random sequence
6237142669Circuit for generating hash values
6247136487System and method for automatically protecting private video content using embedded cryptographic security
6257136484Cryptosystems using commuting pairs in a monoid
6267127063Method and apparatus for computing a shared secret key
6277123717Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm
6287116782Encryption in a secure computerized gaming system
6297113592Method and device for loading input data into a program when performing an authentication
6307110986Automated banking machine system and method
6317110545Method and apparatus for symmetric-key encryption
6327110538Method for accelerating cryptographic operations on elliptic curves
6337107461Methods and apparatus for customizing a rewritable storage medium
6347106864Chaos-based data protection using time-discrete dynamical systems
6357103180Method of implementing the data encryption standard with reduced computation
6367095851Voice and data encryption method using a cryptographic key split combiner
6377085376Method and system for securely exchanging encryption key determination information
6387080804Hot-start navigation information distribution system
6397079650Computing method for elliptic curve cryptography
6407076656Methods and apparatus for providing efficient password-authenticated key exchange
6417050581Method for making secure one or several computer installations using a common secret key algorithm, use of the method and a computer system utilizing the method
6427050579Cryptographic methods and apparatus using word-wise montgomery multiplication
6437047408Secure mutual network authentication and key exchange protocol
6447043015Methods for point compression for Jacobians of hyperelliptic curves
6457003106Efficient method for multiplication over galois fields
6466993662Method and system for copy protection of displayed data content

2005

6476968060Method for verifying the use of public keys generated by an on-board system
6486959091Cryptography private key storage and recovery method and apparatus
6496957333System and method for encrypted communications between electronic devices
6506956950Computer readable medium having a private key encryption program
6516956947Extraction of multiple single keys from a compressed key
6526956946Method and device for cryptographic processing with the aid of an elliptic curve on a computer
6536952770Method and apparatus for hardware platform identification with privacy protection
6546952477Fault intolerant cipher chaining
6556952476Verification of the private components of a public-key cryptographic system
6566950948Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections
6576948065Platform and method for securely transmitting an authorization secret
6586948064Method and apparatus for providing public key security control for a cryptographic processor
6596944300Method for migrating a base chip key from one computer system to another
6606941454System and method of sending and receiving secure data with a shared key
6616940980High security cryptosystem
6626940979Management of certificates for public key infrastructure
6636937728Verifiable anonymous channel
6646937726System and method for protecting data files by periodically refreshing a decryption key
6656934392Split-key key-agreement protocol
6666934389Method and apparatus for providing bus-encrypted copy protection key to an unsecured bus
6676931126Non malleable encryption method and apparatus using key-encryption keys and digital signature
6686928546Identity verification method using a central biometric authority
6696928162Method and system for manipulating and telescoping a hash function
6706925182Administration and utilization of private keys in a networked environment
6716922785Apparatus and a method for secure communications for network computers
6726912657Method and arrangement in a communication network
6736912656Method and apparatus for sending encrypted electronic mail through a distribution list exploder
6746912654Secret key generating method, encryption method, cryptographic communication method and cryptographic communication system
6756912285Mechanism for efficient private bulk messaging
6766912284Self-Authenticating cryptographic apparatus
6776909786Cryptographic trap door with timed lock and controlled escrow
6786909702Method and apparatus for out-of-band transmission of broadcast service option in a wireless communication system
6796898288Method and system for secure key exchange
6806898287Cryptographic system using chaotic dynamics
6816886098Systems and methods for compression of key sets having multiple keys
6826886096Identity-based encryption system
6836876745Method and apparatus for elliptic curve cryptography and recording medium therefore
6846873977Achieving buyer-seller anonymity for unsophisticated users under collusion amongst intermediaries
6856873706Processing apparatus, program, or system of secret information
6866868160System and method for providing secure sharing of electronic data
6876859533System and method for transferring the right to decode messages in a symmetric encoding scheme
6886851049Method and apparatus for facilitating secure anonymous email recipients
6896839839Public key distribution using an approximate linear function
6906839838Data management system, information processing apparatus, authentification management apparatus, method and storage medium
6916839437Method and apparatus for managing keys for cryptographic operations

2004

6926834272Privacy preserving negotiation and computation
6936834112Secure distribution of private keys to multiple clients
6946816970Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
6956816966Techniques for securing data flow in internet multicasting
6966813358Method and system for timed-release cryptosystems
6976813357Exclusive key sharing method
6986804782Countermeasure to power attack and timing attack on cryptographic operations
6996801999Passive and active software objects containing bore resistant watermarking
7006798884Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium
7016789195Secure data processing method
7026788788Cryptographic communication method, encryption method, and cryptographic communication system
7036785388Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium
7046782100Accelerated finite field operations on an elliptic curve
7056779111Indirect public-key encryption
7066778666Cryptographic method using construction of elliptic curve cryptosystem
7076754820Multiple level access system
7086751318Method and apparatus for digital signature authentication
7096744894Data management system
7106741991Data management system
7116731755Split-key cryptographic system and method
7126724894Cryptographic device having reduced vulnerability to side-channel attack and method of operating same
7136721887Data copyright management system
7146721421Method for encrypting information represented as a numerical value
7156718468Method for associating a password with a secured public/private key pair
7166715073Secure server using public key registration and methods of operation
7176711263Secure distribution and protection of encryption key information
7186707801Method and apparatus for data transport in a wireless communication system
7196697488Practical non-malleable public-key cryptosystem
7206694025Method and apparatus for secure distribution of public/private key pairs
7216687822Method and system for providing translation certificates
7226683955Method for receiving a secured transmission of information through a plurality of frequency orthogonal subchannels
7236683953Encoding method, encoding-decoding apparatus, and code communications system
7246678821Method and system for restricting access to the private key of a user in a public key infrastructure

2003

7256665405Cyclotomic polynomial construction of discrete logarithm cryptosystems over finite fields
7266658569Secret key cryptographic process for protecting a computer system against attacks by physical analysis
7276618483Elliptic curve encryption systems
7286614909Methods, systems, and circuits for generating keys for public key cryptosystems using parallel processing for modular operations of IC cards
7296603445Method and apparatus for factoring large numbers with optoelectronic devices
7306598163Flash mixing apparatus and method
7316587946Method and system for quorum controlled asymmetric proxy encryption
7326587563Cryptographic system using chaotic dynamics
7336564322Method and apparatus for watermarking with no perceptible trace
7346560336Apparatus for operating double vector and encrypting system including the same
7356553493Secure mapping and aliasing of private keys used in public key cryptography
7366550009Encryption system for distributing a common crypt key
7376530020Group oriented public key encryption and key management system
7386523116Secure personal information card database system
7396516415Device and method of maintaining a secret code within an integrated circuit package
7406507656Non malleable encryption apparatus and method

2002

7416496929Generating RSA moduli including a predetermined portion
7426490352Cryptographic elliptic curve apparatus and method
7436480831Method and apparatus for securely transmitting keys from a postage metering apparatus to a remote data center
7446480606Elliptic curve encryption method and system
7456480605Encryption and decryption devices for public-key cryptosystems and recording medium with their processing programs recorded thereon
7466477254Network system using a threshold secret sharing method
7476463536Data copyright management system
7486459791Public key cryptography method
7496446205Cryptosystems with elliptic curves chosen by users
7506446051Document transfer systems
7516430292System and method for controlling disclosure time of information
7526412072Parasitically powered microprocessor capable of transmitting data over a single data line and ground
7536411715Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key
7546408389System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
7556404890Generating RSA moduli including a predetermined portion
7566401204Process for cryptographic code management between a first computer unit and a second computer unit
7576396926Scheme for fast realization of encrytion, decryption and authentication
7586385318Encrypting method, deciphering method and certifying method
7596385317Method for providing a secure communication between two devices and application of this method
7606381699Leak-resistant cryptographic method and apparatus
7616381331Information sending system and method for sending encrypted information
7626378072Cryptographic system
7636377689Key transmission system
7646377688Cryptographic communication method and system
7656373946Communication security
7666370250Method of authentication and storage of private keys in a public key cryptography system (PKCS)
7676366673Method and device for executing a decrypting mechanism through calculating a standardized modular exponentiation for thwarting timing attacks
7686363480Ephemeral decryptability
7696351536Encryption network system and method
7706345098Method, system and apparatus for improved reliability in generating secret cryptographic variables
7716339828System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
7726339824Method and apparatus for providing public key security control for a cryptographic processor
7736337909Generation of session keys for El Gamal-like protocols from low hamming weight integers

2001

7746330674Use of biometrics as a methodology for defining components for ECC encryption
7756330332Prime number generation apparatus B-smoothness judgement apparatus and computer memory product
7766317833Practical mix-based election scheme
7776311270Method and apparatus for securing communication utilizing a security processor
7786307938Method, system and apparatus for generating self-validating prime numbers
7796307935Method and apparatus for fast elliptic encryption with direct embedding
7806304658Leak-resistant cryptographic method and apparatus
7816298137Ring-based public key cryptosystem method
7826292895Public key cryptosystem with roaming user capability
7836292892Apparatus and method for providing secured communications
7846289454Memory configuration which support multiple cryptographical algorithms
7856285760Method and apparatus for digital signature authentication
7866275936Decryption method and device, and access right authentication method and apparatus
7876272635Data copyright management system
7886263446Method and apparatus for secure distribution of authentication credentials to roaming users
7896259790Secret communication and authentication scheme based on public key cryptosystem using N-adic expansion
7906240187Key replacement in a public key cryptosystem
7916237097Robust efficient distributed RSA-key generation
7926230269Distributed authentication system and method
7936219789Microprocessor with coprocessing capabilities for secure transactions and quick clearing capabilities
7946215877Key management server, chat system terminal unit, chat system and recording medium
7956212277Elliptic curve transformation device, utilization device and utilization system
7966195433Private key validity and validation
7976192472Method and apparatus for the secure distributed storage and retrieval of information
7986185685Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
7996185546Apparatus and method for providing secured communications
8006170058Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use

2000

8016154543Public key cryptosystem with roaming user capability
8026154541Method and apparatus for a robust high-speed cryptosystem
8036151676Administration and utilization of secret fresh random numbers in a networked environment
8046144740Method for designing public key cryptosystems against fault-based attacks with an implementation
8056141422Secure cryptographic multi-exponentiation method and coprocessor subsystem
8066141420Elliptic curve encryption systems
8076134431Personal station authentication system and authentication method
8086134325Key transmission system
8096125185System and method for encryption key generation
8106125182Cryptographic engine using logic and base conversions
8116111956Method for secure key distribution over a nonsecure communications network
8126111952Asymmetrical cryptographic communication method and portable object therefore
8136108419Differential fault analysis hardening apparatus and evaluation method
8146098056System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet
8156091819Accelerating public-key cryptography by precomputing randomly generated pairs
8166081893System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
8176081793Method and system for secure computer moderated voting
8186081598Cryptographic system and method with fast decryption
8196081597Public key cryptosystem method and apparatus
8206078667Generating unique and unpredictable values
8216075864Method of establishing secure, digitally signed communications using an encryption key based on a blocking set cryptosystem
8226073125Token key distribution system controlled acceptance mail payment and evidencing system
8236072876Method and system for depositing private key used in RSA cryptosystem
8246069954Cryptographic data integrity with serial bit processing and pseudo-random generators
8256049610Method and apparatus for digital signature authentication
8266047072Method for secure key distribution over a nonsecure communications network
8276038317Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2.sup.l
8286035041Optimal-resilience, proactive, public-key cryptographic system and method
8296026163Distributed split-key cryptosystem and applications

1999

8306005943Electronic identifiers for network terminal devices
8315999629Data encryption security module
8325991415Method and apparatus for protecting public key schemes from timing and fault attacks
8335991414Method and apparatus for the secure distributed storage and retrieval of information
8345987133Electronic authentication system
8355987124Method and apparatus for encrypting long blocks using a short-block encryption procedure
8365974151Public key cryptographic system having differential security levels
8375974141Data management system
8385960087Distributed garbage collection system and method
8395956408Apparatus and method for secure distribution of data
8405956407Public key cryptographic system having nested security levels
8415956406Method of setting up secure communications and associated encryption/decryption system
8425933503Controlled modular cryptography apparatus and method
8435915018Key management system for DVD copyright management
8445909491Method for sending a secure message in a telecommunications system
8455905799Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
8465870470Method and apparatus for encrypting long blocks using a short-block encryption procedure
8475864667Method for safe communications

1998

8485850450Method and apparatus for encryption key creation
8495850444Method and apparatus for encrypting radio traffic in a telecommunications network
8505850443Key management system for mixed-trust environments
8515848159Public key cryptographic apparatus and method
8525838792Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
8535835598Public key method of encoding data
8545832207Secure module with microprocessor and co-processor
8555832091Fingerprint controlled public key cryptographic system
8565825300Method of protected distribution of keying and certificate material
8575805712Apparatus and method for providing secured communications
8585805703Method and apparatus for digital signature authentication
8595799088Non-deterministic public key encrypton system
8605796840Apparatus and method for providing secured communications
8615796833Public key sterilization
8625790675Cryptographic communication process
8635768389Method and system for generation and management of secret key of public key cryptosystem
8645764768Blind encryption
8655761311Blind encryption
8665761310Communication system for messages enciphered according to an RSA-type procedure
8675761307Method for securing data in a telecommunications system
8685761306Key replacement in a public key cryptosystem
8695751813Use of an encryption server for encrypting messages
8705751808Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions
8715748735Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography
8725745571Cryptographic communications method and system
8735740250Tame automorphism public key system
8745737425Cryptosystem employing worst-case difficult-to solve lattice problem
8755737424Method and system for secure distribution of protected data using elliptic curve systems
8765737420Method for secure data transmission between remote stations
8775737419Computer system for securing communications using split private key asymmetric cryptography
8785712800Broadcast key distribution apparatus and method using chinese remainder

1997

8795680460Biometric controlled key generation
8805680458Root key compromise recovery
8815666419Encryption device and communication apparatus using same
8825663896Broadcast key distribution apparatus and method using Chinese Remainder
8835651066Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information
8845638445Blind encryption
8855625692Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
8865604801Public key data communications system under control of a portable security device

1996

8875588061System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
8885586186Method and system for controlling unauthorized access to information distributed to users
8895581616Method and apparatus for digital signature authentication
8905577124Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions
8915577123Public-key cryptographic apparatus handling ciphertext by public-key
8925563950System and methods for data encryption using public key cryptography
8935559889System and methods for data encryption using public key cryptography
8945557678System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
8955552897Secure communication apparatus and method
8965541994Fingerprint controlled public key cryptographic system
8975539828Apparatus and method for providing secured communications
8985535276Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
8995499299Modular arithmetic operation system
9005497423Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication

1995

9015463690Method and apparatus for public key exchange in a cryptographic system
9025442706Secure mobile storage

1994

9035373560Partial modular reduction method
9045371794Method and apparatus for privacy and authentication in wireless networks
9055369708Fast server-aided computation system and method for modular exponentiation without revealing client's secret to auxiliary device
9065351298Cryptographic communication method and apparatus
9075351297Method of privacy communication using elliptic curves
9085297206Cryptographic method for communication and electronic signatures
9095295188Public key encryption and decryption circuitry and method
9105289542Caller identification system with encryption

1993

9115274707Modular exponentiation and reduction device and method
9125272755Public key cryptosystem with an elliptic curve
9135271061Method and apparatus for public key exchange in a cryptographic system
9145241599Cryptographic protocol for secure communications
9155220604Method for performing group exclusion in hierarchical group structures
9165202921Method and apparatus for authenticating users of a communication system to each other
9175201000Method for generating public and private key pairs without using a passphrase
9185199070Method for generating a public key

1992

9195159632Method and apparatus for public key exchange in a cryptographic system
9205146500Public key cryptographic system using elliptic curves over rings
9215144665Cryptographic communication method and system
9225142579Public key cryptographic system and method
9235142577Method and apparatus for authenticating messages
9245136642Cryptographic communication method and cryptographic communication device
9255124117Cryptographic key distribution method and system
9265121429Digital signal processing

1991

9275073935Method for secure communication
9285073934Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key
9295068895Encryption and decryption methods using bit-length preservation decryptor
9305054066Error correcting public key cryptographic method and program
9315046094Server-aided computation method and distributed information processing unit

1990

9324969190Encrypting system of data
9334964164RSA computation method for efficient batch processing
9344949379Process for encrypted information transmission
9354944007Public key diversification method
9364926480Card-computer moderated systems

1989

9374888801Hierarchical key management system
9384870681Cryptographic method and cryptographic processor for carrying out the method
9394841570One-way transformation of information
9404807288Microprocessor intended particularly for executing the calculation algorithms of a public code encoding system

1988

9414736423Technique for reducing RSA Crypto variable storage

1987

9424703503Cryptographic system using pseudocomplements of vector Boolean algebra
9434658094Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large unsigned integer

1986

9444633036Method and apparatus for use in public-key data encryption system
9454567600Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission

1985

9464532638Method and apparatus for the exponentiation of large binary numbers in a residue class modulo N, particularly for encoding and decoding digitally-represented messages
9474514592Cryptosystem

1984

9484471164Stream cipher operation using public key cryptosystem
9494424414Exponentiation cryptographic apparatus and method

1983

9504405829Cryptographic communications system and method
9514399323Fast real-time public key cryptography

1982

9524351982RSA Public-key data encryption system having large random prime number generating microprocessor or the like

1981

9534306111Simple and effective public-key cryptosystem

1980

9544218582Public key cryptographic apparatus and method
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017