HK1251708A1 - 根據緊湊源代碼生成加密函數參數 - Google Patents
根據緊湊源代碼生成加密函數參數Info
- Publication number
- HK1251708A1 HK1251708A1 HK18110831.2A HK18110831A HK1251708A1 HK 1251708 A1 HK1251708 A1 HK 1251708A1 HK 18110831 A HK18110831 A HK 18110831A HK 1251708 A1 HK1251708 A1 HK 1251708A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- source code
- function parameters
- cryptographic function
- generating cryptographic
- compact source
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/691,337 US10375070B2 (en) | 2015-04-20 | 2015-04-20 | Generating cryptographic function parameters from compact source code |
PCT/CA2016/050450 WO2016168925A1 (en) | 2015-04-20 | 2016-04-20 | Generating cryptographic function parameters from compact source code |
Publications (1)
Publication Number | Publication Date |
---|---|
HK1251708A1 true HK1251708A1 (zh) | 2019-02-01 |
Family
ID=57142741
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HK18110831.2A HK1251708A1 (zh) | 2015-04-20 | 2018-08-22 | 根據緊湊源代碼生成加密函數參數 |
Country Status (7)
Country | Link |
---|---|
US (2) | US10375070B2 (zh) |
EP (1) | EP3286746B1 (zh) |
KR (1) | KR102570801B1 (zh) |
CN (1) | CN107683502B (zh) |
CA (1) | CA2983163C (zh) |
HK (1) | HK1251708A1 (zh) |
WO (1) | WO2016168925A1 (zh) |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10361844B2 (en) | 2015-04-20 | 2019-07-23 | Certicom Corp. | Generating cryptographic function parameters based on an observed astronomical event |
US10079675B2 (en) | 2015-04-20 | 2018-09-18 | Certicom Corp. | Generating cryptographic function parameters from a puzzle |
US10375070B2 (en) | 2015-04-20 | 2019-08-06 | Certicom Corp. | Generating cryptographic function parameters from compact source code |
EP3252988B1 (en) * | 2016-05-31 | 2021-07-28 | Thales Dis France SA | Partial unrolling for software security |
US10320565B2 (en) * | 2017-02-28 | 2019-06-11 | Certicom Corp. | Generating an elliptic curve point in an elliptic curve cryptographic system |
US11010233B1 (en) | 2018-01-18 | 2021-05-18 | Pure Storage, Inc | Hardware-based system monitoring |
US11005656B2 (en) * | 2018-12-07 | 2021-05-11 | Arris Enterprises Llc | Embedding information in elliptic curve base point |
US10764029B1 (en) * | 2019-04-02 | 2020-09-01 | Carey Patrick Atkins | Asymmetric Encryption Algorithm |
US11720714B2 (en) | 2019-11-22 | 2023-08-08 | Pure Storage, Inc. | Inter-I/O relationship based detection of a security threat to a storage system |
US11657155B2 (en) | 2019-11-22 | 2023-05-23 | Pure Storage, Inc | Snapshot delta metric based determination of a possible ransomware attack against data maintained by a storage system |
US11651075B2 (en) | 2019-11-22 | 2023-05-16 | Pure Storage, Inc. | Extensible attack monitoring by a storage system |
US11625481B2 (en) | 2019-11-22 | 2023-04-11 | Pure Storage, Inc. | Selective throttling of operations potentially related to a security threat to a storage system |
US20210382992A1 (en) * | 2019-11-22 | 2021-12-09 | Pure Storage, Inc. | Remote Analysis of Potentially Corrupt Data Written to a Storage System |
US11675898B2 (en) * | 2019-11-22 | 2023-06-13 | Pure Storage, Inc. | Recovery dataset management for security threat monitoring |
US11941116B2 (en) * | 2019-11-22 | 2024-03-26 | Pure Storage, Inc. | Ransomware-based data protection parameter modification |
US11500788B2 (en) | 2019-11-22 | 2022-11-15 | Pure Storage, Inc. | Logical address based authorization of operations with respect to a storage system |
US11615185B2 (en) | 2019-11-22 | 2023-03-28 | Pure Storage, Inc. | Multi-layer security threat detection for a storage system |
US11720692B2 (en) | 2019-11-22 | 2023-08-08 | Pure Storage, Inc. | Hardware token based management of recovery datasets for a storage system |
US11645162B2 (en) | 2019-11-22 | 2023-05-09 | Pure Storage, Inc. | Recovery point determination for data restoration in a storage system |
US11755751B2 (en) | 2019-11-22 | 2023-09-12 | Pure Storage, Inc. | Modify access restrictions in response to a possible attack against data stored by a storage system |
US11520907B1 (en) * | 2019-11-22 | 2022-12-06 | Pure Storage, Inc. | Storage system snapshot retention based on encrypted data |
US11687418B2 (en) | 2019-11-22 | 2023-06-27 | Pure Storage, Inc. | Automatic generation of recovery plans specific to individual storage elements |
US11341236B2 (en) | 2019-11-22 | 2022-05-24 | Pure Storage, Inc. | Traffic-based detection of a security threat to a storage system |
US11108429B1 (en) * | 2020-06-01 | 2021-08-31 | Raytheon Company | Covert acoustic communications through solid propagation channels using spread spectrum coding and adaptive channel pre-distortion |
CN112383522B (zh) * | 2020-11-02 | 2023-02-24 | 浙江苍南仪表集团股份有限公司 | 函数参数数据传输加密方法、系统、装置及可读存储介质 |
WO2023000304A1 (en) * | 2021-07-23 | 2023-01-26 | Huawei Technologies Co., Ltd. | Method for entropy service and related products |
WO2023081407A2 (en) * | 2021-11-07 | 2023-05-11 | Ntt Research, Inc. | Cryptographic data message expansion for increasing adversarial storage requirements |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5579316A (en) * | 1994-05-02 | 1996-11-26 | Adtran | Communications technique for transmitting limited size digital data frames using macro headers to represent multiple header code patterns associated with encapsulation protocols and signal processing operations to which transmitted data are subjected |
EP0839344A1 (en) | 1995-07-20 | 1998-05-06 | Dallas Semiconductor Corporation | Microcircuit with memory that is protected by both hardware and software |
US6490352B1 (en) | 1999-03-05 | 2002-12-03 | Richard Schroeppel | Cryptographic elliptic curve apparatus and method |
US7308096B2 (en) | 2000-05-30 | 2007-12-11 | Hitachi, Ltd. | Elliptic scalar multiplication system |
US20020131592A1 (en) * | 2001-03-16 | 2002-09-19 | Harris Hinnant | Entropy sources for encryption key generation |
FR2828780B1 (fr) | 2001-08-20 | 2004-01-16 | France Telecom | Procede de realisation d'une unite cryptographique pour un systeme de cryptographie asymetrique utilisant une fonction logarithme discret |
US20040086117A1 (en) | 2002-06-06 | 2004-05-06 | Petersen Mette Vesterager | Methods for improving unpredictability of output of pseudo-random number generators |
US7552176B2 (en) | 2003-03-12 | 2009-06-23 | Microsoft Corporation | Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles |
EP1618460A4 (en) | 2003-04-21 | 2008-10-29 | Skysquared Ltd | SYSTEMS AND METHODS FOR GENERATING RANDOM NUMBERS FROM ASTRONOMICAL EVENTS |
US7240338B1 (en) * | 2003-05-29 | 2007-07-03 | Itt Manufacturing Enterprises, Inc. | Computer language translation system and method of converting procedural computer language software to object-oriented computer language software |
US8108683B2 (en) | 2006-08-10 | 2012-01-31 | International Business Machines Corporation | Mitigating dictionary attacks on password-protected local storage |
EP2001154A1 (fr) | 2007-06-05 | 2008-12-10 | Nicolas Reffe | Procédé et dispositif de chiffrement/déchiffrement d'une séquence de données d'entrée |
CN101677399B (zh) | 2008-09-18 | 2014-07-09 | 香港科技大学 | 基于流密码的安全编码方案的多媒体内容编码方法和系统 |
US20110040977A1 (en) * | 2009-08-11 | 2011-02-17 | Apple Inc. | Sponge and hash functions using a rubik's cube puzzle process |
EP2363977B1 (en) * | 2010-02-26 | 2012-10-24 | Research In Motion Limited | Methods and devices for computing a shared encryption key |
EP2388730A1 (en) * | 2010-05-17 | 2011-11-23 | Nagravision S.A. | Method for generating software code |
US8984292B2 (en) | 2010-06-24 | 2015-03-17 | Microsoft Corporation | Keyed human interactive proof players |
WO2012136763A2 (en) | 2011-04-05 | 2012-10-11 | Intrinsic Id B.V. | Random number generating system based on memory start-up noise |
EP2715968A4 (en) | 2011-05-26 | 2015-08-12 | Certicom Corp | RANDOM FOR ENCRYPTION OPERATIONS |
US8787564B2 (en) | 2011-11-30 | 2014-07-22 | Certicom Corp. | Assessing cryptographic entropy |
FI125308B (en) | 2012-07-05 | 2015-08-31 | Blancco Oy Ltd | Device, arrangement, method, and computer program for erasing data stored in mass storage |
CA2914785C (en) | 2013-04-18 | 2019-12-17 | RISOFTDEV, Inc. | System and methods for encrypting data |
US20150117636A1 (en) | 2013-10-30 | 2015-04-30 | Apriva, Llc | System and method for performing a secure cryptographic operation on a mobile device |
US9680647B2 (en) * | 2014-03-24 | 2017-06-13 | Infineon Technologies Ag | Method of using a token in cryptography |
EP3056984A1 (en) * | 2015-02-11 | 2016-08-17 | Gemalto Sa | Method to generate high quality random mask from small entropy source |
US10079675B2 (en) | 2015-04-20 | 2018-09-18 | Certicom Corp. | Generating cryptographic function parameters from a puzzle |
US10375070B2 (en) | 2015-04-20 | 2019-08-06 | Certicom Corp. | Generating cryptographic function parameters from compact source code |
US10361844B2 (en) | 2015-04-20 | 2019-07-23 | Certicom Corp. | Generating cryptographic function parameters based on an observed astronomical event |
-
2015
- 2015-04-20 US US14/691,337 patent/US10375070B2/en active Active
-
2016
- 2016-04-20 KR KR1020177033006A patent/KR102570801B1/ko active IP Right Grant
- 2016-04-20 EP EP16782422.6A patent/EP3286746B1/en active Active
- 2016-04-20 WO PCT/CA2016/050450 patent/WO2016168925A1/en unknown
- 2016-04-20 CA CA2983163A patent/CA2983163C/en active Active
- 2016-04-20 CN CN201680036017.XA patent/CN107683502B/zh active Active
-
2018
- 2018-08-22 HK HK18110831.2A patent/HK1251708A1/zh unknown
-
2019
- 2019-08-01 US US16/529,629 patent/US10944751B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
WO2016168925A1 (en) | 2016-10-27 |
US10375070B2 (en) | 2019-08-06 |
US10944751B2 (en) | 2021-03-09 |
US20170063534A1 (en) | 2017-03-02 |
EP3286746A4 (en) | 2018-12-12 |
EP3286746B1 (en) | 2023-02-22 |
CA2983163A1 (en) | 2016-10-27 |
KR20170139067A (ko) | 2017-12-18 |
CN107683502A (zh) | 2018-02-09 |
CA2983163C (en) | 2023-09-26 |
US20190356666A1 (en) | 2019-11-21 |
KR102570801B1 (ko) | 2023-08-24 |
EP3286746A1 (en) | 2018-02-28 |
CN107683502B (zh) | 2021-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1251708A1 (zh) | 根據緊湊源代碼生成加密函數參數 | |
ZA201607780B (en) | Generating an agriculture prescription | |
IL263515A (en) | source of radiation | |
IL284458B (en) | electron source | |
GB201720175D0 (en) | An encryption process | |
HK1255314A1 (zh) | 雙光子可調諧源 | |
HK1251706A1 (zh) | 根據觀察到的天文事件生成加密函數參數 | |
GB201621970D0 (en) | Power generating apparatus | |
GB201519612D0 (en) | Key sequence generation for cryptographic operations | |
GB2548503B (en) | System for generating an output file | |
GB2541133B (en) | Interrupt generating unit | |
HK1251707A1 (zh) | 根據拼圖生成加密函數參數 | |
GB2551890B (en) | Plasma generating apparatus | |
LT3360209T (lt) | Lazerinė sistema subnanosekundinio plataus spektro generavimui | |
EP3388390A4 (en) | OZONE PRODUCTION PROCESS | |
ZA201902995B (en) | X-ray source | |
GB2571607B (en) | Ion source | |
GB201505434D0 (en) | Cryptographic processing | |
GB201707579D0 (en) | Power generating apparatus | |
GB2546014B (en) | Ion source | |
GB201506352D0 (en) | Coherent radiation source | |
GB2529831B (en) | Power generating system | |
ZA201707638B (en) | Code encryption | |
EP3281180A4 (en) | Generating optimized geometries | |
PL3578014T3 (pl) | Źródło plazmy |