HK1165053A1 - Accelerated verification of digital signatures and public keys - Google Patents

Accelerated verification of digital signatures and public keys

Info

Publication number
HK1165053A1
HK1165053A1 HK12105810.3A HK12105810A HK1165053A1 HK 1165053 A1 HK1165053 A1 HK 1165053A1 HK 12105810 A HK12105810 A HK 12105810A HK 1165053 A1 HK1165053 A1 HK 1165053A1
Authority
HK
Hong Kong
Prior art keywords
verification
bit length
public keys
digital signatures
accelerated verification
Prior art date
Application number
HK12105810.3A
Other languages
English (en)
Inventor
Marinus Struik
Robert Gallant
Daniel Brown
Scott Vanstone
Robert Lambert
Adrian Antipa
Original Assignee
Certicom Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=36691948&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=HK1165053(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Certicom Corp filed Critical Certicom Corp
Publication of HK1165053A1 publication Critical patent/HK1165053A1/xx

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/725Finite field arithmetic over elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Analysis (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Computational Mathematics (AREA)
  • Algebra (AREA)
  • General Engineering & Computer Science (AREA)
  • Complex Calculations (AREA)
  • Storage Device Security (AREA)
  • Error Detection And Correction (AREA)
  • Credit Cards Or The Like (AREA)
HK12105810.3A 2005-01-18 2012-06-14 Accelerated verification of digital signatures and public keys HK1165053A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US64403405P 2005-01-18 2005-01-18

Publications (1)

Publication Number Publication Date
HK1165053A1 true HK1165053A1 (en) 2012-09-28

Family

ID=36691948

Family Applications (1)

Application Number Title Priority Date Filing Date
HK12105810.3A HK1165053A1 (en) 2005-01-18 2012-06-14 Accelerated verification of digital signatures and public keys

Country Status (7)

Country Link
US (4) US8204232B2 (ja)
EP (2) EP2395424B1 (ja)
JP (3) JP5068176B2 (ja)
AT (1) ATE533103T1 (ja)
CA (2) CA2592875C (ja)
HK (1) HK1165053A1 (ja)
WO (1) WO2006076800A1 (ja)

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7693277B2 (en) * 2005-01-07 2010-04-06 First Data Corporation Generating digital signatures using ephemeral cryptographic key
US8467535B2 (en) 2005-01-18 2013-06-18 Certicom Corp. Accelerated verification of digital signatures and public keys
EP2395424B1 (en) * 2005-01-18 2013-07-31 Certicom Corp. Accelerated verification of digital signatures and public keys
US7885406B2 (en) 2006-10-10 2011-02-08 Microsoft Corporation Computing endomorphism rings of Abelian surfaces over finite fields
SG175679A1 (en) * 2006-11-13 2011-11-28 Certicom Corp Compressed ecdsa signatures
WO2008058388A1 (en) * 2006-11-15 2008-05-22 Certicom Corp. Implicit certificate verification
WO2008067646A1 (en) * 2006-12-04 2008-06-12 Sxip Identity Corp. Method and system for trusted client bootstrapping
CA2616627A1 (en) * 2007-06-21 2008-12-21 Copperleaf Technologies Inc. System and method for modeling an asset-based business cross-reference to related applications
WO2009009868A1 (en) 2007-07-17 2009-01-22 Certicom Corp. Method of compressing a cryptographic value
CA2698000C (en) * 2007-09-04 2015-10-27 Certicom Corp. Signatures with confidential message recovery
US8874920B2 (en) * 2008-02-26 2014-10-28 Texas Instruments Incorporated Verifying cryptographic signature from stored primitives of previously received signature
US8345864B1 (en) * 2008-12-12 2013-01-01 Emc Corporation Elliptic curve cryptography scalar multiplication with on demand acceleration table generation
CN102318260B (zh) 2008-12-16 2016-04-20 塞尔蒂卡姆公司 密钥协商协议的加速
EP2493112B1 (en) * 2011-02-28 2018-02-28 Certicom Corp. Accelerated key agreement with assisted computations
US8549299B2 (en) 2011-02-28 2013-10-01 Certicom Corp. Accelerated key agreement with assisted computations
EP2495907A1 (en) * 2011-02-28 2012-09-05 Certicom Corp. System and method for reducing computations in the derivation of a publick key corresponding to an implicit certificate
US8572367B2 (en) 2011-02-28 2013-10-29 Certicom Corp. System and method for reducing computations in an implicit certificate scheme
CA2770001C (en) * 2011-03-07 2014-08-19 Certicom Corp. Accelerated verification of digital signatures and public keys
CA2830285C (en) * 2011-03-18 2016-11-08 Blackberry Limited Keyed pv signatures
US8675869B2 (en) 2011-03-23 2014-03-18 Blackberry Limited Incorporating data into an ECDSA signature component
US9003181B2 (en) * 2011-03-23 2015-04-07 Certicom Corp. Incorporating data into cryptographic components of an ECQV certificate
JP2012227901A (ja) * 2011-04-22 2012-11-15 Toshiba Corp 認証コンポーネント、被認証コンポーネントおよびその認証方法
WO2012151653A1 (en) 2011-05-06 2012-11-15 Certicom Corp. Validating a batch of implicit certificates
KR101166129B1 (ko) * 2011-05-31 2012-07-23 서울대학교산학협력단 사전계산 테이블을 이용한 이산대수 계산 방법 및 그 장치
US8745376B2 (en) * 2011-10-14 2014-06-03 Certicom Corp. Verifying implicit certificates and digital signatures
US10148285B1 (en) 2012-07-25 2018-12-04 Erich Schmitt Abstraction and de-abstraction of a digital data stream
US10795858B1 (en) 2014-02-18 2020-10-06 Erich Schmitt Universal abstraction and de-abstraction of a digital data stream
US9705683B2 (en) * 2014-04-04 2017-07-11 Etas Embedded Systems Canada Inc. Verifiable implicit certificates
US9645794B2 (en) * 2014-09-23 2017-05-09 Texas Instruments Incorporated Homogeneous atomic pattern for double, add, and subtract operations for digital authentication using elliptic curve cryptography
US9679253B2 (en) 2014-11-06 2017-06-13 Copperleaf Technologies Inc. Methods for maintaining infrastructure equipment and related apparatus
GB201508278D0 (en) * 2015-05-14 2015-06-24 Hybond As Filler material
US10529041B2 (en) 2016-04-18 2020-01-07 Rs Ltd. System and method for managing transactions in dynamic digital documents
US10521775B2 (en) 2016-04-18 2019-12-31 R3 Ltd. Secure processing of electronic transactions by a decentralized, distributed ledger system
US9800411B1 (en) * 2016-05-05 2017-10-24 ISARA Corporation Using a secret generator in an elliptic curve cryptography (ECC) digital signature scheme
TW201810989A (zh) * 2016-05-18 2018-03-16 納格維遜股份有限公司 用以保護密碼指數的方法及系統
EP3382930A1 (en) * 2017-03-31 2018-10-03 Nxp B.V. Intelligent transportation system station, host processor, and method therefor
EP3382932A1 (en) * 2017-03-31 2018-10-03 Nxp B.V. Intelligent transportation system station, host processor, and method therefor
GB201707168D0 (en) * 2017-05-05 2017-06-21 Nchain Holdings Ltd Computer-implemented system and method
GB201806112D0 (en) * 2018-04-13 2018-05-30 Nchain Holdings Ltd Computer-implemented system and method
US10873462B1 (en) * 2018-06-21 2020-12-22 Onu Technology, Inc. Verification of computation by untrusted source
EP3673616A4 (en) 2019-05-31 2020-10-28 Advanced New Technologies Co., Ltd. PUBLIC KEY RESTORATION PROCESS BASED ON AN SM2 SIGNATURE
US11546161B2 (en) * 2020-02-21 2023-01-03 Hong Kong Applied Science and Technology Research Institute Company Limited Zero knowledge proof hardware accelerator and the method thereof
CN111901102B (zh) * 2020-06-28 2023-05-05 成都质数斯达克科技有限公司 数据传输方法、电子设备以及可读存储介质
US20240146531A1 (en) * 2022-10-28 2024-05-02 Apple Inc. Mobile identification techniques
CN117857050A (zh) * 2023-12-12 2024-04-09 武汉大学 一种基于多标量点乘的sm2数字签名验证方法、系统及设备

Family Cites Families (108)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2536928B1 (fr) 1982-11-30 1989-10-06 France Etat Systeme pour chiffrer et dechiffrer des informations, du type utilisant un systeme de dechiffrement a cle publique
US4519036A (en) 1983-01-05 1985-05-21 Emi Limited Program storage hardware with security scheme
US4745568A (en) 1986-12-16 1988-05-17 Onyszchuk Ivan M Computational method and apparatus for finite field multiplication
EP0246823A3 (en) 1986-05-22 1989-10-04 Racal-Guardata Limited Data communication systems and methods
US4748668A (en) 1986-07-09 1988-05-31 Yeda Research And Development Company Limited Method, apparatus and article for identification and signature
US5218637A (en) 1987-09-07 1993-06-08 L'etat Francais Represente Par Le Ministre Des Postes, Des Telecommunications Et De L'espace Method of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization
DE3855497T2 (de) 1988-10-18 1997-03-13 Philips Electronics Nv Datenverarbeitungsgerät zur Berechnung eines multiplikativ invertierten Elements eines endigen Körpers
US5202995A (en) 1989-10-12 1993-04-13 International Business Machines Corporation Method for removing invariant branches from instruction loops of a computer program
GB9008362D0 (en) 1990-04-12 1990-06-13 Hackremco No 574 Limited Banking computer system
DE69017686D1 (de) 1990-10-24 1995-04-13 Omnisec Ag Regensdorf Geheimübertragungssystem mit Möglichkeit zur verschlüsselten Kommunikation zwischen Benutzern mit gesichertem Schlüssel, welcher ohne Benutzereinwirkung bestimmt wird.
FR2672402B1 (fr) 1991-02-05 1995-01-27 Gemplus Card Int Procede et dispositif pour la generation de nombres pseudo-aleatoires uniques.
EP0503119B1 (en) 1991-03-14 1995-09-20 Omnisec Ag Public key cryptographic system using elliptic curves over rings
US5351297A (en) 1991-06-28 1994-09-27 Matsushita Electric Industrial Co., Ltd. Method of privacy communication using elliptic curves
US5272755A (en) 1991-06-28 1993-12-21 Matsushita Electric Industrial Co., Ltd. Public key cryptosystem with an elliptic curve
US5159632A (en) 1991-09-17 1992-10-27 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system
US5271061A (en) * 1991-09-17 1993-12-14 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system
US6307935B1 (en) * 1991-09-17 2001-10-23 Apple Computer, Inc. Method and apparatus for fast elliptic encryption with direct embedding
US5373560A (en) 1991-12-06 1994-12-13 Schlafly; Roger Partial modular reduction method
US5666296A (en) 1991-12-31 1997-09-09 Texas Instruments Incorporated Method and means for translating a data-dependent program to a data flow graph with conditional expression
US5524222A (en) 1992-03-27 1996-06-04 Cyrix Corporation Microsequencer allowing a sequence of conditional jumps without requiring the insertion of NOP or other instructions
US5396558A (en) 1992-09-18 1995-03-07 Nippon Telegraph And Telephone Corporation Method and apparatus for settlement of accounts by IC cards
US5442707A (en) 1992-09-28 1995-08-15 Matsushita Electric Industrial Co., Ltd. Method for generating and verifying electronic signatures and privacy communication using elliptic curves
CA2150683C (en) 1992-12-22 1999-09-07 Nicholas Demytko A cryptographic method
JPH06314203A (ja) 1993-04-28 1994-11-08 Fujitsu Ltd コンパイラの最適化方法および装置
US5497423A (en) 1993-06-18 1996-03-05 Matsushita Electric Industrial Co., Ltd. Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication
US5825880A (en) 1994-01-13 1998-10-20 Sudia; Frank W. Multi-step digital signature method and system
AU3073595A (en) 1994-07-29 1996-03-04 Certicom Corp. Elliptic curve encryption systems
CA2167631A1 (en) 1995-01-20 1996-07-21 W. Dale Hopkins Method and apparatus for user and security device authentication
US5675645A (en) 1995-04-18 1997-10-07 Ricoh Company, Ltd. Method and apparatus for securing executable programs against copying
US5761305A (en) 1995-04-21 1998-06-02 Certicom Corporation Key agreement and transport protocol with implicit signatures
WO1996033565A1 (en) 1995-04-21 1996-10-24 Certicom Corp. Method for signature and session key generation
CA2176972C (en) 1995-05-17 2008-11-25 Scott A. Vanstone Key agreement and transport protocol with implicit signatures
US5768389A (en) 1995-06-21 1998-06-16 Nippon Telegraph And Telephone Corporation Method and system for generation and management of secret key of public key cryptosystem
US5764772A (en) 1995-12-15 1998-06-09 Lotus Development Coporation Differential work factor cryptography method and system
US5778069A (en) 1996-04-10 1998-07-07 Microsoft Corporation Non-biased pseudo random number generator
US5999626A (en) 1996-04-16 1999-12-07 Certicom Corp. Digital signatures on a smartcard
US5892899A (en) 1996-06-13 1999-04-06 Intel Corporation Tamper resistant methods and apparatus
US6526456B1 (en) 1996-07-01 2003-02-25 David Ian Allan Distribution and controlled use of software products
US6088798A (en) * 1996-09-27 2000-07-11 Kabushiki Kaisha Toshiba Digital signature method using an elliptic curve, a digital signature system, and a program storage medium having the digital signature method stored therein
US5937066A (en) 1996-10-02 1999-08-10 International Business Machines Corporation Two-phase cryptographic key recovery system
CA2228185C (en) 1997-01-31 2007-11-06 Certicom Corp. Verification protocol
GB2321741B (en) * 1997-02-03 2000-10-04 Certicom Corp Data card verification system
GB9707861D0 (en) * 1997-04-18 1997-06-04 Certicom Corp Arithmetic processor
US5991415A (en) 1997-05-12 1999-11-23 Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science Method and apparatus for protecting public key schemes from timing and fault attacks
EP0892520A3 (en) * 1997-07-17 2001-10-17 Matsushita Electric Industrial Co., Ltd. Elliptic curve calculation apparatus capable of calculating multiples at high speed
US5987131A (en) 1997-08-18 1999-11-16 Picturetel Corporation Cryptographic key exchange using pre-computation
US6292897B1 (en) * 1997-11-03 2001-09-18 International Business Machines Corporation Undeniable certificates for digital signature verification
US6411715B1 (en) 1997-11-10 2002-06-25 Rsa Security, Inc. Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key
US6279110B1 (en) 1997-11-10 2001-08-21 Certicom Corporation Masked digital signatures
US6334189B1 (en) 1997-12-05 2001-12-25 Jamama, Llc Use of pseudocode to protect software from unauthorized use
DE69834431T3 (de) 1998-01-02 2009-09-10 Cryptography Research Inc., San Francisco Leckresistentes kryptographisches verfahren und vorrichtung
DE69930334T2 (de) * 1998-01-28 2006-11-09 Hitachi, Ltd. IC-Karte ausgerüstet mit einer Verarbeitungsanlage für Elliptische-Kurven-Verschlüsselung
US6404890B1 (en) 1998-04-08 2002-06-11 Citibank, Na Generating RSA moduli including a predetermined portion
EP1090480B1 (en) 1998-06-03 2019-01-09 Cryptography Research, Inc. Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems
US6212279B1 (en) 1998-06-26 2001-04-03 The United States Of America As Represented By The United States National Security Agency Method of elliptic curve cryptographic key exchange using reduced base tau expansion in non-adjacent form
US6243467B1 (en) * 1998-07-23 2001-06-05 The United States Of America As Represented By The National Security Agency Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form
DE69906897T2 (de) 1998-09-03 2004-01-29 Nippon Telegraph & Telephone Gerät und Verfahren zur Elliptische-Kurven Multiplikation und Aufnahmemedium mitdarauf aufgenommen ein Program zur Ausführung des Verfahrens
JP3796993B2 (ja) * 1998-12-22 2006-07-12 株式会社日立製作所 楕円曲線暗号実行方法及び装置並びに記録媒体
CA2257008C (en) 1998-12-24 2007-12-11 Certicom Corp. A method for accelerating cryptographic operations on elliptic curves
US20020057796A1 (en) * 1998-12-24 2002-05-16 Lambert Robert J. Method for accelerating cryptographic operations on elliptic curves
CA2259089C (en) 1999-01-15 2013-03-12 Robert J. Lambert Method and apparatus for masking cryptographic operations
US7599491B2 (en) 1999-01-11 2009-10-06 Certicom Corp. Method for strengthening the implementation of ECDSA against power analysis
US6490352B1 (en) * 1999-03-05 2002-12-03 Richard Schroeppel Cryptographic elliptic curve apparatus and method
US6298135B1 (en) 1999-04-29 2001-10-02 Motorola, Inc. Method of preventing power analysis attacks on microelectronic assemblies
US6419159B1 (en) 1999-06-14 2002-07-16 Microsoft Corporation Integrated circuit device with power analysis protection circuitry
US6829356B1 (en) * 1999-06-29 2004-12-07 Verisign, Inc. Server-assisted regeneration of a strong secret from a weak secret
JP4354609B2 (ja) * 1999-07-16 2009-10-28 パナソニック株式会社 有限体上の連立方程式求解装置及び逆元演算装置
WO2001019017A1 (fr) * 1999-09-07 2001-03-15 Sony Corporation Systeme, dispositif, procede et support de programme pour la gestion de contenus
WO2001018772A1 (fr) * 1999-09-08 2001-03-15 Hitachi, Ltd. Procede et dispositif d'elaboration de courbes elliptiques, systeme elliptique de cryptage et support d'enregistrement
KR100373669B1 (ko) 1999-09-29 2003-02-26 가부시키가이샤 히타치세이사쿠쇼 비밀 정보의 처리 장치, 비밀 정보의 처리 프로그램을 기록한 기록 매체 및 처리 시스템
US6724894B1 (en) 1999-11-05 2004-04-20 Pitney Bowes Inc. Cryptographic device having reduced vulnerability to side-channel attack and method of operating same
DE19963408A1 (de) 1999-12-28 2001-08-30 Giesecke & Devrient Gmbh Tragbarer Datenträger mit Zugriffsschutz durch Schlüsselteilung
JP2001320356A (ja) * 2000-02-29 2001-11-16 Sony Corp 公開鍵系暗号を使用したデータ通信システムおよびデータ通信システム構築方法
FR2807898B1 (fr) * 2000-04-18 2002-06-28 Gemplus Card Int Procede de cryptographie sur courbes elliptiques
US7308096B2 (en) * 2000-05-30 2007-12-11 Hitachi, Ltd. Elliptic scalar multiplication system
US6993136B2 (en) * 2000-08-18 2006-01-31 The United States Of America As Represented By The National Security Agency Cryptographic key exchange method using efficient elliptic curve
JP2002207427A (ja) * 2001-01-10 2002-07-26 Sony Corp 公開鍵証明書発行システム、公開鍵証明書発行方法、および情報処理装置、情報記録媒体、並びにプログラム記憶媒体
JP3950638B2 (ja) * 2001-03-05 2007-08-01 株式会社日立製作所 耐タンパーモジュラ演算処理方法
US7167559B2 (en) * 2001-03-28 2007-01-23 Matsushita Electric Industrial Co., Ltd. Information security device, exponentiation device, modular exponentiation device, and elliptic curve exponentiation device
JP3859983B2 (ja) * 2001-04-27 2006-12-20 日本電信電話株式会社 ブラインド署名方法、その装置、そのプログラム及びその記録媒体
JP2002328845A (ja) 2001-05-07 2002-11-15 Fujitsu Ltd 半導体集積回路及びicカードのセキュリティー保護方法
JP4596686B2 (ja) 2001-06-13 2010-12-08 富士通株式会社 Dpaに対して安全な暗号化
US7142670B2 (en) 2001-08-14 2006-11-28 International Business Machines Corporation Space-efficient, side-channel attack resistant table lookups
JP2003131568A (ja) * 2001-10-26 2003-05-09 Hitachi Ltd 楕円曲線署名検証方法及び装置並びに記憶媒体
US7127063B2 (en) 2001-12-31 2006-10-24 Certicom Corp. Method and apparatus for computing a shared secret key
CA2369545C (en) 2001-12-31 2013-01-08 Certicom Corp. Method and apparatus for elliptic curve scalar multiplication
JP4034585B2 (ja) * 2002-01-28 2008-01-16 松下電器産業株式会社 楕円曲線演算装置及び楕円曲線演算方法
US7505585B2 (en) * 2002-06-25 2009-03-17 The United States Of America As Represented By The Director, The National Security Agency Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same
GB0215524D0 (en) * 2002-07-05 2002-08-14 Hewlett Packard Co Method and apparatus for generating a cryptographic key
US7401109B2 (en) * 2002-08-06 2008-07-15 The State Of Oregon Acting By And Through The State Board Of Higher Education On Behalf Of Oregon State University Multiplication of multi-precision numbers having a size of a power of two
CA2439736C (en) * 2002-09-03 2013-05-21 Certicom Corp. Method and apparatus for performing validation of elliptic curve public keys
JP2004163687A (ja) 2002-11-13 2004-06-10 Fujitsu Ltd 楕円曲線暗号装置、楕円曲線暗号プログラム
US7613660B2 (en) * 2002-12-30 2009-11-03 Pitney Bowes Inc. System and method for mail destination address information encoding, protection and recovery in postal payment
US7103772B2 (en) * 2003-05-02 2006-09-05 Giritech A/S Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
US20040249765A1 (en) * 2003-06-06 2004-12-09 Neopost Inc. Use of a kiosk to provide verifiable identification using cryptographic identifiers
FR2856538B1 (fr) * 2003-06-18 2005-08-12 Gemplus Card Int Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme cryptographique du type a cle publique
US20050039100A1 (en) * 2003-08-14 2005-02-17 International Business Machines Corporation Method and system for automatic error recovery in an electronic mail system
JP3854954B2 (ja) * 2003-09-05 2006-12-06 キヤノン株式会社 データ共有装置
WO2005034421A2 (en) * 2003-10-03 2005-04-14 Matsushita Electric Industrial Co., Ltd. Information transfer system, encryption device, and decryption device using elliptic curve
KR100720726B1 (ko) 2003-10-09 2007-05-22 삼성전자주식회사 Rsa 알고리즘을 이용한 보안유지시스템 및 그 방법
CN1868163B (zh) * 2003-10-16 2011-01-26 松下电器产业株式会社 加密通信系统和通信装置
JP4741503B2 (ja) * 2003-10-28 2011-08-03 サーティコム コーポレーション 公開鍵を検証可能に生成する方法及び装置
US7620179B2 (en) * 2004-01-29 2009-11-17 Comcast Cable Holdings, Llc System and method for security processing media streams
US7593527B2 (en) * 2005-01-07 2009-09-22 First Data Corporation Providing digital signature and public key based on shared knowledge
EP2395424B1 (en) * 2005-01-18 2013-07-31 Certicom Corp. Accelerated verification of digital signatures and public keys
US8467535B2 (en) * 2005-01-18 2013-06-18 Certicom Corp. Accelerated verification of digital signatures and public keys
WO2008058388A1 (en) * 2006-11-15 2008-05-22 Certicom Corp. Implicit certificate verification
CA2698000C (en) 2007-09-04 2015-10-27 Certicom Corp. Signatures with confidential message recovery

Also Published As

Publication number Publication date
US10284370B2 (en) 2019-05-07
CA2592875C (en) 2016-09-06
JP2012014203A (ja) 2012-01-19
JP2012212164A (ja) 2012-11-01
EP1842128A4 (en) 2009-11-04
WO2006076800A1 (en) 2006-07-27
EP2395424B1 (en) 2013-07-31
CA2935823C (en) 2019-01-15
US8806197B2 (en) 2014-08-12
US20140344579A1 (en) 2014-11-20
US20070064932A1 (en) 2007-03-22
US20120230494A1 (en) 2012-09-13
ATE533103T1 (de) 2011-11-15
EP1842128B1 (en) 2011-11-09
JP2008527865A (ja) 2008-07-24
JP5068176B2 (ja) 2012-11-07
US8204232B2 (en) 2012-06-19
EP1842128A1 (en) 2007-10-10
US8788827B2 (en) 2014-07-22
EP2395424A1 (en) 2011-12-14
JP5373026B2 (ja) 2013-12-18
CA2935823A1 (en) 2006-07-27
US20130064367A1 (en) 2013-03-14
CA2592875A1 (en) 2006-07-27

Similar Documents

Publication Publication Date Title
HK1165053A1 (en) Accelerated verification of digital signatures and public keys
WO2008002897A3 (en) Reduction of errors during computation of inverse discrete cosine transform
MY165770A (en) Use of isogenies for design of cryptosystems
WO2008002822A3 (en) Mulptiplying two numbers
WO2008076148A3 (en) Distortion estimation
TW200703014A (en) System and method of adjusting output voltage of a transmitter based on error rate
ATE464599T1 (de) Verfahren zur skalarmultiplikation in gruppen elliptischer kurven über primkörpern für nebenkanal-attacken-beständige kryptosysteme
WO2021154749A3 (en) Mobile key enrollment and use
GB2464049A (en) System for identifying content of digital data
TW200712905A (en) Hardware assisted receive channel frame handling via data offset comparison in sas ssp wide port applications
ATE466329T1 (de) Verfahren zur skalarmultiplikation in gruppen elliptischer kurven über binäre polynomische körper für nebenkanalattacken-beständige kryptosysteme
WO2009155146A3 (en) Digitally signing documents using identity context information
TW200705149A (en) Method of forming an in-rush limiter and structure therefor
WO2008110987A3 (en) A data processing system for clipping correction
NZ603822A (en) Permutation data transform to enhance security
EP1879341A3 (en) Lattice-reduction-aided detection applying a modified Lenstra-Lenstra-Lovasz (LLL) algorithm
IL182962A0 (en) A method for generating a composite image
TW200633478A (en) Two ways slider-type electronic device and sliding assembly
Debnath et al. Growth of meromorphic functions depending on (p, q)-th relative order
AU2003270476A1 (en) Keyboard improvements
WO2011011179A3 (en) Communication channel claim dependent security precautions
ATE507170T1 (de) Transportvorrichtung
WO2006094016A3 (en) Method for low distortion embedding of edit distance to hamming distance
WO2009077482A3 (en) Adjusting soft values to reduce bias
DE602005022938D1 (de) Hardwarestapel mit einträgen mit einem datenteil und einem assoziierten zähler