JP2005195829A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2005195829A5 JP2005195829A5 JP2004001602A JP2004001602A JP2005195829A5 JP 2005195829 A5 JP2005195829 A5 JP 2005195829A5 JP 2004001602 A JP2004001602 A JP 2004001602A JP 2004001602 A JP2004001602 A JP 2004001602A JP 2005195829 A5 JP2005195829 A5 JP 2005195829A5
- Authority
- JP
- Japan
- Prior art keywords
- randomized
- converting
- public key
- signature
- processing unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims 13
- 230000001131 transforming effect Effects 0.000 claims 1
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2004001602A JP4626148B2 (ja) | 2004-01-07 | 2004-01-07 | 復号または署名作成におけるべき乗剰余算の計算方法 |
| EP04016352A EP1553720B1 (en) | 2004-01-07 | 2004-07-12 | Modular exponentiation method in decryption or signature generation |
| DE602004023811T DE602004023811D1 (de) | 2004-01-07 | 2004-07-12 | Verfahren zur modularen Potenzierung zur Entschlüsselung bzw. zur Erzeugung von digitalen Signaturen |
| US10/893,523 US7512231B2 (en) | 2004-01-07 | 2004-07-19 | Computation method for modular exponentiation operation in decryption or signature generation |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2004001602A JP4626148B2 (ja) | 2004-01-07 | 2004-01-07 | 復号または署名作成におけるべき乗剰余算の計算方法 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2005195829A JP2005195829A (ja) | 2005-07-21 |
| JP2005195829A5 true JP2005195829A5 (enExample) | 2007-02-22 |
| JP4626148B2 JP4626148B2 (ja) | 2011-02-02 |
Family
ID=34587677
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2004001602A Expired - Fee Related JP4626148B2 (ja) | 2004-01-07 | 2004-01-07 | 復号または署名作成におけるべき乗剰余算の計算方法 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US7512231B2 (enExample) |
| EP (1) | EP1553720B1 (enExample) |
| JP (1) | JP4626148B2 (enExample) |
| DE (1) | DE602004023811D1 (enExample) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2015171A1 (fr) * | 2007-06-29 | 2009-01-14 | Gemplus | Procédé cryptographique comprenant une exponentiation modulaire sécurisée contre les attaques à canaux cachés sans la connaissance de l'exposant public, cryptoprocesseur pour la mise en oeuvre du procédé et carte à puce associée |
| FR2977953A1 (fr) * | 2011-07-13 | 2013-01-18 | St Microelectronics Rousset | Protection d'un calcul d'exponentiation modulaire par addition d'une quantite aleatoire |
| FR3015076B1 (fr) * | 2013-12-17 | 2016-02-05 | Oberthur Technologies | Generation de cles cryptographiques |
| FR3015079B1 (fr) * | 2013-12-17 | 2016-02-05 | Oberthur Technologies | Verification d'integrite de paire de cles cryptographiques |
| CN105099684B (zh) * | 2014-05-08 | 2019-08-16 | 国民技术股份有限公司 | 一种模幂运算的处理方法、装置及密码设备 |
| US11343071B2 (en) * | 2016-02-05 | 2022-05-24 | Micro Focus Llc | Extended ciphertexts |
| KR101982237B1 (ko) * | 2017-03-06 | 2019-05-24 | 고려대학교 산학협력단 | 클라우드 컴퓨팅 환경에서의 속성 기반 암호화를 이용한 데이터 공유 방법 및 시스템 |
| KR102003936B1 (ko) * | 2019-02-18 | 2019-07-29 | 주식회사 에이티이엔지 | 해킹방지용 데이터 전송 케이블 |
| US11249726B2 (en) | 2019-09-10 | 2022-02-15 | Intel Corporation | Integrated circuits with modular multiplication circuitry |
| CN111352609B (zh) * | 2020-03-05 | 2022-06-14 | 青岛大学 | 一种基于边缘计算的分布式外包模幂运算方法 |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0697687A4 (en) * | 1994-03-07 | 2000-09-20 | Nippon Telegraph & Telephone | METHOD AND SYSTEM FOR PROVIDING AUTHENTICATION PROTOCOL BASED ON ZERO KNOWLEDGE |
| US6411715B1 (en) * | 1997-11-10 | 2002-06-25 | Rsa Security, Inc. | Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key |
| DE69834431T3 (de) * | 1998-01-02 | 2009-09-10 | Cryptography Research Inc., San Francisco | Leckresistentes kryptographisches verfahren und vorrichtung |
| JP4317607B2 (ja) * | 1998-12-14 | 2009-08-19 | 株式会社日立製作所 | 情報処理装置、耐タンパ処理装置 |
| JP4083925B2 (ja) * | 1999-06-24 | 2008-04-30 | 株式会社日立製作所 | 情報処理装置、カード部材および情報処理システム |
| JP2002247025A (ja) * | 2001-02-22 | 2002-08-30 | Hitachi Ltd | 情報処理装置 |
| DE10143728B4 (de) * | 2001-09-06 | 2004-09-02 | Infineon Technologies Ag | Vorrichtung und Verfahren zum Berechnen eines Ergebnisses einer modularen Exponentiation |
| JP4086503B2 (ja) * | 2002-01-15 | 2008-05-14 | 富士通株式会社 | 暗号演算装置及び方法並びにプログラム |
| EP1540880B1 (de) * | 2002-09-11 | 2006-03-08 | Giesecke & Devrient GmbH | Geschützte kryptographische berechnung |
| TW586086B (en) * | 2002-12-27 | 2004-05-01 | Ind Tech Res Inst | Method and apparatus for protecting public key schemes from timing, power and fault attacks |
-
2004
- 2004-01-07 JP JP2004001602A patent/JP4626148B2/ja not_active Expired - Fee Related
- 2004-07-12 EP EP04016352A patent/EP1553720B1/en not_active Expired - Lifetime
- 2004-07-12 DE DE602004023811T patent/DE602004023811D1/de not_active Expired - Lifetime
- 2004-07-19 US US10/893,523 patent/US7512231B2/en not_active Expired - Fee Related
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TWI448963B (zh) | 用於密碼系統之以中國餘數定理為基礎之計算方法 | |
| KR101795771B1 (ko) | 정수 기반 준동형 암호 기법에서 압축 암복호화를 제공하는 시스템 및 방법 | |
| CN102437912B (zh) | 一种基于混沌算法的n重rsa加密算法的数字版权保护方法 | |
| JP2001324925A5 (enExample) | ||
| EP2704352A1 (en) | Method, device and system for processing encrypted text | |
| JP5001176B2 (ja) | 署名生成装置、署名生成方法及び署名生成プログラム | |
| JP2013524263A5 (enExample) | ||
| US7936874B2 (en) | Information transfer system, encryption device, and decryption device | |
| RU2007135358A (ru) | Небольшие цифровые подписи на основе открытого ключа, используемые для аутентификации | |
| JP2014207717A (ja) | 指数難読化 | |
| US8548161B2 (en) | Crytographically transforming data text | |
| Vigila et al. | Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications. | |
| JP2005195829A5 (enExample) | ||
| GB2399904B (en) | Side channel attack prevention in data processing apparatus | |
| CN107465508B (zh) | 一种软硬件结合构造真随机数的方法、系统和设备 | |
| EP0996250A2 (en) | Efficient block cipher method | |
| CN111865555A (zh) | 一种基于k-Lin假设的同态加密方法 | |
| JP4626148B2 (ja) | 復号または署名作成におけるべき乗剰余算の計算方法 | |
| KR101440680B1 (ko) | 중국인 나머지 정리에 기반한 준동형 암복호화 방법 및 이를 이용한 장치 | |
| JP5323196B2 (ja) | 演算装置、方法およびプログラム | |
| CN107040370B (zh) | 一种用于产生实施模幂运算的代码的装置 | |
| KR20090004625A (ko) | 공개 키 암호화 연산의 순서 변경 방법 | |
| JP2005165290A5 (enExample) | ||
| KR100326226B1 (ko) | 행렬그룹공개키생성방법 | |
| Shams et al. | Cryptosystem an Implementation of RSA using Verilog |