ATE408940T1 - Verfahren und einrichtung zur effizienten mehrteilnehmer-vervielfachung - Google Patents
Verfahren und einrichtung zur effizienten mehrteilnehmer-vervielfachungInfo
- Publication number
- ATE408940T1 ATE408940T1 AT04770350T AT04770350T ATE408940T1 AT E408940 T1 ATE408940 T1 AT E408940T1 AT 04770350 T AT04770350 T AT 04770350T AT 04770350 T AT04770350 T AT 04770350T AT E408940 T1 ATE408940 T1 AT E408940T1
- Authority
- AT
- Austria
- Prior art keywords
- multiple participants
- efficient
- gate
- efficient multiplication
- multiplication
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
- G06F7/40—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using contact-making devices, e.g. electromagnetic relay
- G06F7/44—Multiplying; Dividing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Computational Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Electromagnetism (AREA)
- Storage Device Security (AREA)
- Complex Calculations (AREA)
- Arrangements For Transmission Of Measured Signals (AREA)
- Selective Calling Equipment (AREA)
- Computer And Data Communications (AREA)
- Electrotherapy Devices (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP03078437 | 2003-11-03 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE408940T1 true ATE408940T1 (de) | 2008-10-15 |
Family
ID=34530747
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT04770350T ATE408940T1 (de) | 2003-11-03 | 2004-11-02 | Verfahren und einrichtung zur effizienten mehrteilnehmer-vervielfachung |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US20070116283A1 (de) |
| EP (1) | EP1683298B1 (de) |
| JP (1) | JP2007510947A (de) |
| KR (1) | KR20070046778A (de) |
| CN (1) | CN1875569A (de) |
| AT (1) | ATE408940T1 (de) |
| DE (1) | DE602004016678D1 (de) |
| WO (1) | WO2005043808A1 (de) |
Families Citing this family (73)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7392295B2 (en) | 2004-02-19 | 2008-06-24 | Microsoft Corporation | Method and system for collecting information from computer systems based on a trusted relationship |
| EP1815637B1 (de) * | 2004-11-16 | 2016-04-20 | Koninklijke Philips N.V. | Sichere berechnung einer ähnlichkeitsmessung |
| JP4565628B2 (ja) * | 2004-11-26 | 2010-10-20 | 日本電信電話株式会社 | 秘密計算方法及びシステム、並びにプログラム |
| JP4650933B2 (ja) * | 2005-01-24 | 2011-03-16 | 日本電信電話株式会社 | 秘密計算方法及びシステム |
| JP4748663B2 (ja) * | 2005-01-24 | 2011-08-17 | 日本電信電話株式会社 | 秘密計算方法及びシステム、並びにプログラム |
| JP4565632B2 (ja) * | 2005-01-24 | 2010-10-20 | 日本電信電話株式会社 | 秘密計算方法及びシステム、並びにプログラム |
| DE102005030031B4 (de) * | 2005-06-27 | 2007-08-02 | Nec Europe Ltd. | Verfahren zum Datenmanagement in einem Sensornetzwerk |
| ES2509345T3 (es) * | 2005-12-13 | 2014-10-17 | Koninklijke Philips N.V. | Cálculo de protocolo de descifrado de umbral de seguridad |
| US7856100B2 (en) * | 2005-12-19 | 2010-12-21 | Microsoft Corporation | Privacy-preserving data aggregation using homomorphic encryption |
| ATE463898T1 (de) | 2006-01-02 | 2010-04-15 | Sap Ag | System und verfahren für den vergleich von privatwerten |
| JP4863807B2 (ja) * | 2006-01-11 | 2012-01-25 | 日本放送協会 | 匿名課金システム、並びに、コンテンツ視聴装置、視聴料金集計装置、視聴料金復号装置及びコンテンツ配信装置 |
| US7900817B2 (en) | 2006-01-26 | 2011-03-08 | Ricoh Company, Ltd. | Techniques for introducing devices to device families with paper receipt |
| FR2906058B1 (fr) * | 2006-09-14 | 2008-11-21 | Eads Defence And Security Syst | Procede et serveur de verification du contenu d'une urne virtuelle d'un systeme de vote electronique chiffre par un algorithme homomorphique |
| US7668852B2 (en) * | 2006-10-31 | 2010-02-23 | Hewlett-Packard Development Company, L.P. | Method for creating sketches of sets to permit comparison |
| US7937270B2 (en) * | 2007-01-16 | 2011-05-03 | Mitsubishi Electric Research Laboratories, Inc. | System and method for recognizing speech securely using a secure multi-party computation protocol |
| US8498415B2 (en) * | 2007-11-27 | 2013-07-30 | Bon K. Sy | Method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment |
| US8130947B2 (en) * | 2008-07-16 | 2012-03-06 | Sap Ag | Privacy preserving social network analysis |
| US20100185861A1 (en) * | 2009-01-19 | 2010-07-22 | Microsoft Corporation | Anonymous key issuing for attribute-based encryption |
| US8249250B2 (en) * | 2009-03-30 | 2012-08-21 | Mitsubishi Electric Research Laboratories, Inc. | Secure similarity verification between homomorphically encrypted signals |
| US20100329448A1 (en) * | 2009-06-30 | 2010-12-30 | Rane Shantanu D | Method for Secure Evaluation of a Function Applied to Encrypted Signals |
| US8843762B2 (en) * | 2009-09-04 | 2014-09-23 | Gradiant, Centro Tecnolóxico de Telecomunicacións de Galicia | Cryptographic system for performing secure iterative computations and signal processing directly on encrypted data in untrusted environments |
| US8433925B2 (en) * | 2009-09-04 | 2013-04-30 | Gradiant | Cryptographic system for performing secure computations and signal processing directly on encrypted data in untrusted environments |
| US8972742B2 (en) | 2009-09-04 | 2015-03-03 | Gradiant | System for secure image recognition |
| US8903083B2 (en) * | 2010-08-16 | 2014-12-02 | International Business Machines Corporation | Fast evaluation of many polynomials with small coefficients on the same point |
| US8681973B2 (en) * | 2010-09-15 | 2014-03-25 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for performing homomorphic encryption and decryption on individual operations |
| US8837715B2 (en) | 2011-02-17 | 2014-09-16 | Gradiant, Centro Tecnolóxico de Telecomunicacións de Galica | Method and apparatus for secure iterative processing and adaptive filtering |
| US9281941B2 (en) | 2012-02-17 | 2016-03-08 | International Business Machines Corporation | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management |
| WO2014069998A1 (en) * | 2012-10-30 | 2014-05-08 | Nederlandse Organisatie Voor Toegepast-Natuurwetenschappelijk Onderzoek Tno | Method and system for protected exchange of data |
| US9948453B2 (en) | 2013-04-30 | 2018-04-17 | Thomson Licensing | Threshold encryption using homomorphic signatures |
| CN105103487A (zh) * | 2013-08-09 | 2015-11-25 | 汤姆逊许可公司 | 用于基于矩阵分解的到评级贡献用户的隐私保护推荐的方法和系统 |
| US9390292B2 (en) * | 2013-12-30 | 2016-07-12 | Wisconsin Alumni Research Foundation | Encrypted digital circuit description allowing circuit simulation |
| US9264407B2 (en) * | 2014-04-03 | 2016-02-16 | Palo Alto Research Center Incorporated | Computer-implemented system and method for establishing distributed secret shares in a private data aggregation scheme |
| EP2930877A1 (de) * | 2014-04-11 | 2015-10-14 | Thomson Licensing | Blinde Paillier-basierte Entschlüsselungsverfahren und Vorrichtungen |
| SG11201608601TA (en) * | 2014-04-23 | 2016-11-29 | Agency Science Tech & Res | Method and system for generating / decrypting ciphertext, and method and system for searching ciphertexts in a database |
| EP3050011B1 (de) | 2014-05-02 | 2017-09-20 | Barclays Bank Plc. | Transaktionsbeglaubigung |
| US9825758B2 (en) * | 2014-12-02 | 2017-11-21 | Microsoft Technology Licensing, Llc | Secure computer evaluation of k-nearest neighbor models |
| US9787647B2 (en) * | 2014-12-02 | 2017-10-10 | Microsoft Technology Licensing, Llc | Secure computer evaluation of decision trees |
| US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
| CN106160995B (zh) * | 2015-04-21 | 2019-04-16 | 郑珂威 | 基于系数映射变换的多项式完全同态加密方法及系统 |
| FR3047373B1 (fr) * | 2016-01-28 | 2018-01-05 | Morpho | Procede de calcul securise multipartite protege contre une partie malveillante |
| US9960910B2 (en) | 2016-02-25 | 2018-05-01 | Wisconsin Alumni Research Foundation | Encrypted digital circuit description allowing signal delay simulation |
| US10812252B2 (en) | 2017-01-09 | 2020-10-20 | Microsoft Technology Licensing, Llc | String matching in encrypted data |
| JP6732959B2 (ja) * | 2017-01-18 | 2020-07-29 | 日本電信電話株式会社 | 秘密計算方法、秘密計算システム、秘密計算装置、およびプログラム |
| US11196539B2 (en) | 2017-06-22 | 2021-12-07 | Microsoft Technology Licensing, Llc | Multiplication operations on homomorphic encrypted data |
| US10541805B2 (en) * | 2017-06-26 | 2020-01-21 | Microsoft Technology Licensing, Llc | Variable relinearization in homomorphic encryption |
| US10749665B2 (en) | 2017-06-29 | 2020-08-18 | Microsoft Technology Licensing, Llc | High-precision rational number arithmetic in homomorphic encryption |
| WO2019025415A1 (en) * | 2017-07-31 | 2019-02-07 | Koninklijke Philips N.V. | DISTRIBUTION OF A CALCULATION OUTPUT |
| WO2019115697A1 (en) * | 2017-12-14 | 2019-06-20 | Robert Bosch Gmbh | Method for faster secure multiparty inner product with spdz |
| FR3076152B1 (fr) * | 2017-12-21 | 2020-01-10 | Orange | Validation de donnees personnelles d'un utilisateur |
| EP3503458A1 (de) | 2017-12-22 | 2019-06-26 | Nederlandse Organisatie voor toegepast- natuurwetenschappelijk onderzoek TNO | Verteiltes rechenverfahren und system |
| CN108933650B (zh) | 2018-06-28 | 2020-02-14 | 阿里巴巴集团控股有限公司 | 数据加解密的方法及装置 |
| CN108809623B (zh) * | 2018-07-10 | 2020-09-25 | 矩阵元技术(深圳)有限公司 | 安全多方计算方法、装置及系统 |
| CN109377215B (zh) | 2018-08-06 | 2020-04-21 | 阿里巴巴集团控股有限公司 | 区块链交易方法及装置、电子设备 |
| RU2728522C1 (ru) * | 2018-10-17 | 2020-07-30 | Алибаба Груп Холдинг Лимитед | Совместное использование секретов без доверенного инициализатора |
| US10885205B2 (en) * | 2018-10-31 | 2021-01-05 | Nec Corporation Of America | Secure multiparty computation |
| CN109446828B (zh) * | 2018-11-07 | 2020-10-13 | 北京邮电大学 | 一种安全多方计算方法及装置 |
| RU2721959C1 (ru) * | 2018-11-27 | 2020-05-25 | Алибаба Груп Холдинг Лимитед | Система и способ для защиты информации |
| CN110337665B (zh) | 2018-11-27 | 2023-06-06 | 创新先进技术有限公司 | 用于信息保护的系统和方法 |
| PL3549303T3 (pl) | 2018-11-27 | 2021-11-22 | Advanced New Technologies Co., Ltd. | System i sposób ochrony informacji |
| US10700850B2 (en) | 2018-11-27 | 2020-06-30 | Alibaba Group Holding Limited | System and method for information protection |
| ES2833552T3 (es) | 2018-11-27 | 2021-06-15 | Advanced New Technologies Co Ltd | Sistema y método para la protección de información |
| WO2019072275A2 (en) | 2018-11-27 | 2019-04-18 | Alibaba Group Holding Limited | SYSTEM AND METHOD FOR INFORMATION PROTECTION |
| CN109934691B (zh) * | 2019-02-28 | 2023-08-25 | 矩阵元技术(深圳)有限公司 | 一种竞拍的数据处理方法、竞拍客户端及系统 |
| US11218290B2 (en) * | 2019-02-28 | 2022-01-04 | Sap Se | Efficient cloud-based secure computation of the median using homomorphic encryption |
| CN111046409B (zh) * | 2019-12-16 | 2021-04-13 | 支付宝(杭州)信息技术有限公司 | 一种私有数据多方安全计算方法和系统 |
| CN111143894B (zh) * | 2019-12-24 | 2022-01-28 | 支付宝(杭州)信息技术有限公司 | 一种提升安全多方计算效率的方法及系统 |
| US11038683B1 (en) * | 2020-01-24 | 2021-06-15 | Via Science, Inc. | Secure data processing |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| CN111461858B (zh) * | 2020-03-10 | 2023-02-17 | 支付宝(杭州)信息技术有限公司 | 基于隐私保护的连乘计算方法、装置、系统和电子设备 |
| US20240430074A1 (en) * | 2021-01-26 | 2024-12-26 | Nec Corporation | Secure computation system, secure computation server apparatus, secure computation method, and secure computation program |
| GB2606709A (en) | 2021-05-12 | 2022-11-23 | Nchain Licensing Ag | PUF device |
| CN114089948A (zh) * | 2021-11-24 | 2022-02-25 | 支付宝(杭州)信息技术有限公司 | 乘法执行方法、数据准备方法及装置 |
| EP4589877A1 (de) * | 2024-01-16 | 2025-07-23 | Su, Zheng-Yao | Computerimplementiertes verfahren auf der basis eines rahmens exakter homomorpher verschlüsselung und system auf dem rahmen einer exakten homomorphen verschlüsselung |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001020562A2 (en) * | 1999-03-25 | 2001-03-22 | Votehere, Inc. | Multiway election method and apparatus |
| US6772339B1 (en) * | 2000-03-13 | 2004-08-03 | Lucent Technologies Inc. | Mix and match: a new approach to secure multiparty computation |
| WO2003077470A1 (en) * | 2002-03-13 | 2003-09-18 | Koninklijke Philips Electronics N.V. | Polynomial-based multi-user key generation and authentication method and system |
-
2004
- 2004-11-02 JP JP2006537540A patent/JP2007510947A/ja not_active Withdrawn
- 2004-11-02 CN CNA2004800325436A patent/CN1875569A/zh active Pending
- 2004-11-02 US US10/577,757 patent/US20070116283A1/en not_active Abandoned
- 2004-11-02 DE DE602004016678T patent/DE602004016678D1/de not_active Expired - Fee Related
- 2004-11-02 WO PCT/IB2004/052259 patent/WO2005043808A1/en not_active Ceased
- 2004-11-02 EP EP04770350A patent/EP1683298B1/de not_active Expired - Lifetime
- 2004-11-02 KR KR1020067008604A patent/KR20070046778A/ko not_active Withdrawn
- 2004-11-02 AT AT04770350T patent/ATE408940T1/de not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| CN1875569A (zh) | 2006-12-06 |
| JP2007510947A (ja) | 2007-04-26 |
| KR20070046778A (ko) | 2007-05-03 |
| WO2005043808A1 (en) | 2005-05-12 |
| EP1683298A1 (de) | 2006-07-26 |
| EP1683298B1 (de) | 2008-09-17 |
| US20070116283A1 (en) | 2007-05-24 |
| DE602004016678D1 (de) | 2008-10-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE408940T1 (de) | Verfahren und einrichtung zur effizienten mehrteilnehmer-vervielfachung | |
| TW200802852A (en) | Gate electrode structures and methods of manufacture | |
| EP1343349A4 (de) | Lautsprecher, lautsprechermodul und elektronisches gerät, dass das lautsprechermodul verwendet | |
| ATE549834T1 (de) | Kanalschätzungsrückmeldung in einem orthogonal- frequenzmultiplex-system oder dergleichen | |
| DE602004029551D1 (de) | Staggercasting im robusten modus | |
| DE60233104D1 (de) | Auf elliptischen Kurven basierte Kryptosystemvorrichtung, sowie entsprechendes Verfahren und Programm | |
| EP1940074A3 (de) | Sichere Berechnung von Privatwerten | |
| ATE346340T1 (de) | Allgemeine eingabe-/ausgabearchitektur und entsprechende verfahren zur bereitstellung virtueller kanäle | |
| DE60217464D1 (de) | Kanal- und Verzögerungsschätzung in Mehrträgersystemen | |
| DE502005002607D1 (de) | Verfahren zur Datenübertragung | |
| ATE548830T1 (de) | Zustandslose anrufannahme und anrufbevorrechtigung mit einzelzähl- und markierungsschema | |
| BR0308909B1 (pt) | lingueta de fecho laminada elÁstica de nço-tecido. | |
| DE60316522D1 (de) | Ortsabhängige Weiterleitung von Verbindungen in Mobilfunknetzen | |
| DE502004008742D1 (de) | Abbau von verbindungen in kommunikationsnetzen | |
| TW200514409A (en) | A system and associated methods to determine authentication priority between devices | |
| ATE380420T1 (de) | Kryptographische authentifizierung einer vorrichtung | |
| GB0307190D0 (en) | Security attributes of nodes in trusted computing systems | |
| DK1635933T3 (da) | Materialer og fremgangsmåder til forarbejdning af ikke-vandige blandinger | |
| DE60313658D1 (de) | Verbindungen mit selektiver inhibierender wirkung an gsk3 | |
| NO20012030L (no) | Kryptografisk signering i små enheter | |
| ATE360879T1 (de) | Leitungsschutzschalter mit verschiebbarem steckkontakt | |
| MXPA04001759A (es) | Sistema y metodo rapido e iterativo para evaluar una operacion de modulo sin utilizar divisiones. | |
| DE602004025577D1 (de) | Ungen und verfahren zu deren herstellung | |
| DE50211141D1 (de) | Einrichtung und verfahren zur skalierung von soft-output-werten einer empfängerstruktur | |
| TR200707122U (tr) | Limitörlü klemens. |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties | ||
| REN | Ceased due to non-payment of the annual fee |