|
DE19963408A1
(de)
*
|
1999-12-28 |
2001-08-30 |
Giesecke & Devrient Gmbh |
Tragbarer Datenträger mit Zugriffsschutz durch Schlüsselteilung
|
|
JP3821631B2
(ja)
*
|
2000-05-30 |
2006-09-13 |
株式会社日立製作所 |
楕円曲線暗号におけるスカラー倍計算方法及び装置、並びに記憶媒体
|
|
FR2825863B1
(fr)
*
|
2001-06-07 |
2003-09-19 |
Gemplus Card Int |
Procede de securisation d'un calcul d'exponentiation dans un dispositif electronique
|
|
DE10151129B4
(de)
*
|
2001-10-17 |
2004-07-29 |
Infineon Technologies Ag |
Verfahren und Vorrichtung zum Berechnen eines Ergebnisses einer Exponentiation in einer Kryptographieschaltung
|
|
DE10156708B4
(de)
*
|
2001-11-19 |
2005-09-29 |
Infineon Technologies Ag |
Verfahren und Vorrichtung zum Multiplizieren und Verfahren und Vorrichtung zum Addieren auf einer elliptischen Kurve
|
|
JP4067818B2
(ja)
*
|
2001-12-10 |
2008-03-26 |
富士通株式会社 |
楕円曲線暗号装置、楕円曲線暗号プログラム及び楕円曲線暗号の演算方法
|
|
JP4034585B2
(ja)
*
|
2002-01-28 |
2008-01-16 |
松下電器産業株式会社 |
楕円曲線演算装置及び楕円曲線演算方法
|
|
FR2838210B1
(fr)
*
|
2002-04-03 |
2005-11-04 |
Gemplus Card Int |
Procede cryptographique protege contre les attaques de type a canal cache
|
|
US7555122B2
(en)
|
2002-12-04 |
2009-06-30 |
Wired Communications LLC |
Method for elliptic curve point multiplication
|
|
JP4789468B2
(ja)
*
|
2002-12-18 |
2011-10-12 |
富士通株式会社 |
秘密鍵を用いた耐タンパ楕円曲線暗号処理
|
|
US7646872B2
(en)
|
2004-04-02 |
2010-01-12 |
Research In Motion Limited |
Systems and methods to securely generate shared keys
|
|
JP5147412B2
(ja)
|
2005-01-21 |
2013-02-20 |
サーティコム コーポレーション |
楕円曲線乱数生成
|
|
EP1879164A1
(en)
*
|
2005-04-27 |
2008-01-16 |
Matsushita Electric Industrial Co., Ltd. |
Information security device and elliptic curve operating device
|
|
CA2542556C
(en)
|
2005-06-03 |
2014-09-16 |
Tata Consultancy Services Limited |
An authentication system executing an elliptic curve digital signature cryptographic process
|
|
DE102005042339B4
(de)
*
|
2005-09-06 |
2007-08-16 |
Siemens Ag |
Verfahren zum sicheren Ver- oder Entschlüsseln einer Nachricht
|
|
EP1946205B1
(en)
|
2005-10-18 |
2010-04-14 |
Telecom Italia S.p.A. |
A method for scalar multiplication in elliptic curve groups over prime fields for side-channel attack resistant cryptosystems
|
|
DE602005020991D1
(de)
*
|
2005-10-28 |
2010-06-10 |
Telecom Italia Spa |
Verfahren zur skalarmultiplikation in gruppen ellir nebenkanalattacken-beständige kryptosysteme
|
|
DE602006021601D1
(de)
*
|
2005-11-03 |
2011-06-09 |
Certicom Corp |
Verfahren zur gleichzeitigen skalarmultiplikation
|
|
FR2893796B1
(fr)
*
|
2005-11-21 |
2008-01-04 |
Atmel Corp |
Procede de protection par chiffrement
|
|
US9313027B2
(en)
|
2005-12-29 |
2016-04-12 |
Proton World International N.V. |
Protection of a calculation performed by an integrated circuit
|
|
DE102006002891B4
(de)
|
2006-01-20 |
2009-06-04 |
Siemens Ag |
Verfahren, Vorrichtung und System zum Verifizieren von auf einer elliptischen Kurve ermittelten Punkten
|
|
KR100850202B1
(ko)
*
|
2006-03-04 |
2008-08-04 |
삼성전자주식회사 |
Ecc 패스트 몽고매리 전력 래더 알고리즘을 이용하여dfa 에 대응하는 암호화 방법
|
|
US8065735B2
(en)
|
2006-03-16 |
2011-11-22 |
Gemalto Sa |
Method of securing a calculation of an exponentiation or a multiplication by a scalar in an electronic device
|
|
DE102006013515A1
(de)
*
|
2006-03-23 |
2007-10-04 |
Siemens Ag |
Kryptographisches Verfahren mit elliptischen Kurven
|
|
EP1840732A1
(en)
*
|
2006-03-31 |
2007-10-03 |
Axalto SA |
Protection against side channel attacks
|
|
WO2007113697A2
(en)
*
|
2006-04-06 |
2007-10-11 |
Nxp B.V. |
Secure decryption method
|
|
US20070288761A1
(en)
*
|
2006-06-09 |
2007-12-13 |
Dale Jason N |
System and method for booting a multiprocessor device based on selection of encryption keys to be provided to processors
|
|
US20070288739A1
(en)
*
|
2006-06-09 |
2007-12-13 |
Dale Jason N |
System and method for masking a boot sequence by running different code on each processor
|
|
US20070288740A1
(en)
*
|
2006-06-09 |
2007-12-13 |
Dale Jason N |
System and method for secure boot across a plurality of processors
|
|
US7774616B2
(en)
*
|
2006-06-09 |
2010-08-10 |
International Business Machines Corporation |
Masking a boot sequence by providing a dummy processor
|
|
US20070288738A1
(en)
*
|
2006-06-09 |
2007-12-13 |
Dale Jason N |
System and method for selecting a random processor to boot on a multiprocessor system
|
|
US7594104B2
(en)
*
|
2006-06-09 |
2009-09-22 |
International Business Machines Corporation |
System and method for masking a hardware boot sequence
|
|
US7856101B2
(en)
*
|
2007-02-07 |
2010-12-21 |
King Fahd University Of Petroleum And Minerals |
Method for elliptic curve scalar multiplication
|
|
US8243919B2
(en)
*
|
2007-03-07 |
2012-08-14 |
Research In Motion Limited |
Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks
|
|
WO2009004505A1
(en)
*
|
2007-07-05 |
2009-01-08 |
Nxp B.V. |
Microprocessor in a security-sensitive system
|
|
US7991162B2
(en)
*
|
2007-09-14 |
2011-08-02 |
University Of Ottawa |
Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields
|
|
WO2009055904A1
(en)
*
|
2007-10-30 |
2009-05-07 |
Certicom Corp. |
Fault detection in exponentiation and point multiplication operations using a montgomery ladder
|
|
CA2752750A1
(en)
*
|
2009-02-27 |
2010-09-02 |
Certicom Corp. |
System and method for performing exponentiation in a cryptographic system
|
|
JP5449576B2
(ja)
|
2010-12-27 |
2014-03-19 |
三菱電機株式会社 |
演算装置、演算装置の楕円スカラー倍算方法、楕円スカラー倍算プログラム、演算装置の剰余演算方法および剰余演算プログラム
|
|
US8334705B1
(en)
|
2011-10-27 |
2012-12-18 |
Certicom Corp. |
Analog circuitry to conceal activity of logic circuitry
|
|
US8635467B2
(en)
|
2011-10-27 |
2014-01-21 |
Certicom Corp. |
Integrated circuit with logic circuitry and multiple concealing circuits
|
|
US9900154B2
(en)
*
|
2013-12-23 |
2018-02-20 |
Nxp B.V. |
Optimized hardward architecture and method for ECC point addition using mixed affine-jacobian coordinates over short weierstrass curves
|
|
US9979543B2
(en)
|
2013-12-23 |
2018-05-22 |
Nxp B.V. |
Optimized hardware architecture and method for ECC point doubling using jacobian coordinates over short weierstrass curves
|
|
US9929862B2
(en)
|
2013-12-23 |
2018-03-27 |
Nxp B.V. |
Optimized hardware architecture and method for ECC point doubling using Jacobian coordinates over short Weierstrass curves
|
|
US9391773B2
(en)
|
2014-04-04 |
2016-07-12 |
Qualcomm Incorporated |
Elliptic curve point multiplication procedure resistant to side-channel information leakage
|
|
US9645794B2
(en)
*
|
2014-09-23 |
2017-05-09 |
Texas Instruments Incorporated |
Homogeneous atomic pattern for double, add, and subtract operations for digital authentication using elliptic curve cryptography
|
|
US9590805B1
(en)
*
|
2014-12-23 |
2017-03-07 |
EMC IP Holding Company LLC |
Ladder-based cryptographic techniques using pre-computed points
|
|
US9735953B2
(en)
*
|
2015-03-06 |
2017-08-15 |
Qualcomm Incorporated |
Side channel analysis resistant architecture
|
|
US10491401B2
(en)
*
|
2017-02-21 |
2019-11-26 |
Google Llc |
Verification of code signature with flexible constraints
|
|
CN108875416B
(zh)
*
|
2018-06-22 |
2020-05-19 |
北京智芯微电子科技有限公司 |
椭圆曲线多倍点运算方法和装置
|