CN102449951A - 用于在电子组件中执行密码任务的方法 - Google Patents
用于在电子组件中执行密码任务的方法 Download PDFInfo
- Publication number
- CN102449951A CN102449951A CN2010800237657A CN201080023765A CN102449951A CN 102449951 A CN102449951 A CN 102449951A CN 2010800237657 A CN2010800237657 A CN 2010800237657A CN 201080023765 A CN201080023765 A CN 201080023765A CN 102449951 A CN102449951 A CN 102449951A
- Authority
- CN
- China
- Prior art keywords
- function
- data
- encryption
- described method
- carry out
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/304—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy based on error correction codes, e.g. McEliece
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Algebra (AREA)
- Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (15)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0952054 | 2009-03-31 | ||
FR0952054 | 2009-03-31 | ||
PCT/FR2010/050561 WO2010112739A1 (fr) | 2009-03-31 | 2010-03-26 | Procede pour effectuer une tache cryptographique dans un composant electronique |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102449951A true CN102449951A (zh) | 2012-05-09 |
CN102449951B CN102449951B (zh) | 2015-09-23 |
Family
ID=41531735
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201080023765.7A Active CN102449951B (zh) | 2009-03-31 | 2010-03-26 | 用于在电子组件中执行密码任务的方法 |
Country Status (4)
Country | Link |
---|---|
US (1) | US8913741B2 (zh) |
EP (1) | EP2415199B1 (zh) |
CN (1) | CN102449951B (zh) |
WO (1) | WO2010112739A1 (zh) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105814833B (zh) * | 2013-12-20 | 2019-12-13 | 皇家飞利浦有限公司 | 用于安全的数据变换的方法和系统 |
SG10201405852QA (en) | 2014-09-18 | 2016-04-28 | Huawei Internat Pte Ltd | Encryption function and decryption function generating method, encryption and decryption method and related apparatuses |
US10268829B2 (en) | 2017-08-11 | 2019-04-23 | Dragonchain, Inc. | Security systems and methods based on cryptographic utility token inventory tenure |
US10135607B1 (en) | 2017-08-11 | 2018-11-20 | Dragonchain, Inc. | Distributed ledger interaction systems and methods |
US10282741B2 (en) | 2017-09-05 | 2019-05-07 | StormX, Inc. | Taskset-participant-configurable batch content transfer systems and methods |
US10922309B2 (en) | 2018-11-19 | 2021-02-16 | Dragonchain, Inc. | Distributed ledger interaction system and methods |
US11303462B2 (en) | 2018-11-19 | 2022-04-12 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Unequally powered cryptography using physical unclonable functions |
FR3093203A1 (fr) * | 2019-02-22 | 2020-08-28 | Proton World International N.V. | Procédé d'authentification |
TWI829924B (zh) | 2019-05-05 | 2024-01-21 | 喬爾S 馬克斯 | 容易設置的隧道形式的動物陷阱 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0823331A (ja) * | 1994-07-07 | 1996-01-23 | Murata Mach Ltd | 暗号化通信方法及び装置 |
JPH1165439A (ja) * | 1996-08-09 | 1999-03-05 | Nippon Telegr & Teleph Corp <Ntt> | N進表現暗号による通信および認証方法、ならびにそれらの装置、およびn進表現暗号による通信および認証プログラムを格納した記憶媒体 |
JP2001282103A (ja) * | 2000-01-25 | 2001-10-12 | Murata Mach Ltd | 暗号化方法 |
CA2327911A1 (en) * | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
JP3606569B2 (ja) * | 2001-03-09 | 2005-01-05 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 復号回路、該復号回路を用いる復号装置、復号方法および半導体デバイス |
AU2003211981B8 (en) * | 2002-02-20 | 2009-06-25 | Sony Corporation | Data recording medium, data recording method and apparatus, data reproducing method and apparatus, data transmitting method, and data receiving method |
US7197527B2 (en) * | 2002-10-17 | 2007-03-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Efficient arithmetic in finite fields of odd characteristic on binary hardware |
KR100561846B1 (ko) * | 2003-10-08 | 2006-03-16 | 삼성전자주식회사 | 가중된 비밀 공유 및 복원 방법 |
DE102005031611B4 (de) * | 2005-07-06 | 2007-11-22 | Infineon Technologies Ag | Nachweis einer Veränderung der Daten eines Datensatzes |
US7840178B2 (en) * | 2005-07-12 | 2010-11-23 | Martin E. Hellman | FM broadcast system competitive with satellite radio |
US8752032B2 (en) * | 2007-02-23 | 2014-06-10 | Irdeto Canada Corporation | System and method of interlocking to protect software-mediated program and device behaviours |
GB2453367A (en) * | 2007-10-04 | 2009-04-08 | Univ Newcastle | Cryptographic processing using isomorphic mappings of Galois fields |
JP2009116183A (ja) * | 2007-11-08 | 2009-05-28 | Toshiba Corp | 暗号装置、復号装置、鍵生成装置及びプログラム |
US8144864B2 (en) * | 2007-12-28 | 2012-03-27 | Intel Corporation | Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems |
US8565435B2 (en) * | 2010-08-16 | 2013-10-22 | International Business Machines Corporation | Efficient implementation of fully homomorphic encryption |
-
2010
- 2010-03-26 WO PCT/FR2010/050561 patent/WO2010112739A1/fr active Application Filing
- 2010-03-26 CN CN201080023765.7A patent/CN102449951B/zh active Active
- 2010-03-26 EP EP10716585.4A patent/EP2415199B1/fr active Active
- 2010-03-26 US US13/262,349 patent/US8913741B2/en active Active
Non-Patent Citations (3)
Title |
---|
A.MENEZES等: "《Handbook of Applied Cryptography》", 1 October 1996, CRC PRESS * |
ALINE GOUGET等: "Probabilistic Multivariate Cryptography", 《PROGRESS IN CRYPTOLOGY-VIETCRYPT 2006》 * |
JINTAI DING: "A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation", 《PUBLIC KEY CRYPTOGRAPHY-PKC 2004》 * |
Also Published As
Publication number | Publication date |
---|---|
WO2010112739A9 (fr) | 2011-11-17 |
EP2415199A1 (fr) | 2012-02-08 |
US20120020476A1 (en) | 2012-01-26 |
EP2415199B1 (fr) | 2017-10-18 |
CN102449951B (zh) | 2015-09-23 |
US8913741B2 (en) | 2014-12-16 |
WO2010112739A1 (fr) | 2010-10-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102449951B (zh) | 用于在电子组件中执行密码任务的方法 | |
CA2652084C (en) | A method and apparatus to provide authentication and privacy with low complexity devices | |
US6307938B1 (en) | Method, system and apparatus for generating self-validating prime numbers | |
Kuznetsov et al. | Code-based electronic digital signature | |
CN111404952B (zh) | 变电站数据加密传输方法、装置、计算机设备和存储介质 | |
JP2008513811A (ja) | 計算変換の方法及びシステム | |
Koko et al. | Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication | |
CN103780382A (zh) | 一种基于超球面的多变量公钥加密/解密系统及方法 | |
CA2819211C (en) | Data encryption | |
CN103490883A (zh) | 一种多变量公钥加密/解密系统及加密/解密方法 | |
CN101321058B (zh) | 一种用于编码和译码数字消息的方法和系统 | |
Choi et al. | Password typos resilience in honey encryption | |
CN110545169A (zh) | 基于非对称密钥池和隐式证书的区块链方法和系统 | |
Si et al. | An improved RSA signature algorithm based on complex numeric operation function | |
RU2417410C2 (ru) | Способ хранения и использования криптографического ключа | |
JP7371757B2 (ja) | 認証暗号化装置、認証復号装置、認証暗号化方法、認証復号方法およびプログラム | |
Balasubramanian et al. | Problems in cryptography and cryptanalysis | |
Simmons | Symmetric and asymmetric encryption | |
AU7659598A (en) | Pseudo-random generator based on a hash coding function for cryptographic systems requiring random drawing | |
Shcherbacov | On some known possible applications of quasigroups in cryptology | |
Koroglu et al. | Can There Be A Two Way Hash Function? | |
Kitamura et al. | One-time programs with cloud storage and its application to electronic money | |
Selvi et al. | A Novel Hybrid Chaotic Map–Based Proactive RSA Cryptosystem in Blockchain | |
Cryptosystem et al. | A Novel Hybrid | |
Simmons | 10. Symmetric and |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent of invention or patent application | ||
CB02 | Change of applicant information |
Address after: France Applicant after: France Telecom Address before: France Applicant before: France Telecom |
|
COR | Change of bibliographic data |
Free format text: CORRECT: APPLICANT; FROM: FRANCE TELECOM TO: ORANGE CORP. |
|
ASS | Succession or assignment of patent right |
Owner name: KONINKLIKE PHILIPS ELECTRONICS N. V. Free format text: FORMER OWNER: ORANGE CORP. Effective date: 20150401 |
|
TA01 | Transfer of patent application right |
Effective date of registration: 20150401 Address after: Holland Ian Deho Finn Applicant after: Koninkl Philips Electronics NV Address before: France Applicant before: France Telecom |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |