JP2005295507A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2005295507A5 JP2005295507A5 JP2005033533A JP2005033533A JP2005295507A5 JP 2005295507 A5 JP2005295507 A5 JP 2005295507A5 JP 2005033533 A JP2005033533 A JP 2005033533A JP 2005033533 A JP2005033533 A JP 2005033533A JP 2005295507 A5 JP2005295507 A5 JP 2005295507A5
- Authority
- JP
- Japan
- Prior art keywords
- walk
- storage units
- value
- random
- readable media
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims 18
- 230000006870 function Effects 0.000 claims 10
- 238000005295 random walk Methods 0.000 claims 9
- 239000000654 additive Substances 0.000 claims 3
- 230000000996 additive effect Effects 0.000 claims 3
- 230000002708 enhancing effect Effects 0.000 claims 2
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/815,572 US7505588B2 (en) | 2004-03-31 | 2004-03-31 | Stream cipher design with revolving buffers |
| US10/815,572 | 2004-03-31 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2005295507A JP2005295507A (ja) | 2005-10-20 |
| JP2005295507A5 true JP2005295507A5 (enExample) | 2008-03-27 |
| JP4728657B2 JP4728657B2 (ja) | 2011-07-20 |
Family
ID=34887748
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2005033533A Expired - Fee Related JP4728657B2 (ja) | 2004-03-31 | 2005-02-09 | 回転バッファを用いたストリーム暗号設計 |
Country Status (12)
| Country | Link |
|---|---|
| US (1) | US7505588B2 (enExample) |
| EP (1) | EP1583278B1 (enExample) |
| JP (1) | JP4728657B2 (enExample) |
| KR (1) | KR101143041B1 (enExample) |
| CN (1) | CN1677917B (enExample) |
| AT (1) | ATE466430T1 (enExample) |
| AU (1) | AU2005200388B2 (enExample) |
| BR (1) | BRPI0500539A (enExample) |
| CA (1) | CA2497935C (enExample) |
| DE (1) | DE602005020872D1 (enExample) |
| MX (1) | MXPA05002553A (enExample) |
| RU (1) | RU2390949C2 (enExample) |
Families Citing this family (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7853018B2 (en) * | 2005-11-10 | 2010-12-14 | Atallah Mikhail J | Method and apparatus for hiding a private key |
| US7907726B2 (en) * | 2006-01-19 | 2011-03-15 | Microsoft Corporation | Pseudorandom number generation with expander graphs |
| DE102006030325B4 (de) * | 2006-06-30 | 2009-12-31 | Gerhard Kosel | Verfahren für die Konstruktion eines Schlüsselstrom-Generators zur Erzeugung von Pseudo-Zufallszahlen für kryptographische Anwendungen |
| KR100885994B1 (ko) * | 2006-11-09 | 2009-03-03 | 한국전자통신연구원 | 비선형 필터링된 t함수에 기반한 스트림 암호화 장치 및방법 |
| US8036377B1 (en) * | 2006-12-12 | 2011-10-11 | Marvell International Ltd. | Method and apparatus of high speed encryption and decryption |
| KR100931581B1 (ko) * | 2007-12-06 | 2009-12-14 | 한국전자통신연구원 | Tsc-4 스트림 암호 연산을 수행하기 위한 장치 |
| US8588408B2 (en) * | 2008-12-19 | 2013-11-19 | France Telecom | Method of implementing a block cipher algorithm |
| US8719593B2 (en) * | 2009-05-20 | 2014-05-06 | Harris Corporation | Secure processing device with keystream cache and related methods |
| KR101588279B1 (ko) * | 2009-05-26 | 2016-01-25 | 삼성전자주식회사 | 무선 통신 시스템에서 데이터 암호화 방법 및 장치 |
| EA021803B1 (ru) * | 2012-04-25 | 2015-09-30 | Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" (Оао "Инфотекс") | Способ шифрования данных для вычислительных платформ с simd-архитектурой |
| US9584488B2 (en) | 2013-08-09 | 2017-02-28 | Introspective Power, Inc. | Data encryption cipher using rotating ports |
| US9584313B2 (en) | 2013-08-09 | 2017-02-28 | Introspective Power, Inc. | Streaming one time pad cipher using rotating ports for data encryption |
| US20160105276A1 (en) * | 2014-10-10 | 2016-04-14 | Qualcomm Incorporated | Rotation-based cipher |
| RU2595921C1 (ru) * | 2015-03-12 | 2016-08-27 | Евгения Александровна Алисевич | Способ усиления радиосигналов путем управляемой регенерации |
| US11955988B2 (en) * | 2015-12-28 | 2024-04-09 | Vivek Sathyanarayana Nittoor | System and method for generation of error-correcting codes in communication systems |
| RU2706463C1 (ru) * | 2018-07-14 | 2019-11-19 | Хаджимурат Магомедович Гаджиев | Способ кодирования информации в компьютерных сетях с использованием переменного PIN-кода, наборов случайных чисел и функциональных преобразований, проводимых синхронно для передающей и принимающей сторон |
| RU2710669C1 (ru) * | 2018-11-06 | 2019-12-30 | Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" | Способ шифрования данных |
| CN112764782B (zh) * | 2021-01-28 | 2024-07-05 | 维沃移动通信有限公司 | 应用程序的更新方法、应用程序的更新装置 |
Family Cites Families (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| RU2091983C1 (ru) * | 1993-02-09 | 1997-09-27 | Геннадий Николаевич Чижухин | Способ шифрования двоичной информации и устройство для его осуществления |
| US5604806A (en) * | 1995-01-20 | 1997-02-18 | Ericsson Inc. | Apparatus and method for secure radio communication |
| US5724427A (en) * | 1995-08-17 | 1998-03-03 | Lucent Technologies Inc. | Method and apparatus for autokey rotor encryption |
| CA2302784A1 (en) * | 1997-09-17 | 1999-03-25 | Frank C. Luyster | Improved block cipher method |
| US6252958B1 (en) * | 1997-09-22 | 2001-06-26 | Qualcomm Incorporated | Method and apparatus for generating encryption stream ciphers |
| US6496928B1 (en) * | 1998-01-07 | 2002-12-17 | Microsoft Corporation | System for transmitting subscription information and content to a mobile device |
| US6646639B1 (en) * | 1998-07-22 | 2003-11-11 | Nvidia Corporation | Modified method and apparatus for improved occlusion culling in graphics systems |
| US6560338B1 (en) * | 1998-08-28 | 2003-05-06 | Qualcomm Incorporated | Limiting delays associated with the generation of encryption stream ciphers |
| US7170997B2 (en) * | 2000-12-07 | 2007-01-30 | Cryptico A/S | Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data |
| EP2627008A3 (en) * | 2000-12-29 | 2013-09-11 | Intel Mobile Communications GmbH | Channel codec processor configurable for multiple wireless communications standards |
| AU2002327528A1 (en) * | 2001-08-22 | 2003-03-10 | Qualcomm, Incorporated | Method and apparatus for increasing the accuracy and speed of correlation attacks |
| GB0123302D0 (en) * | 2001-09-28 | 2001-11-21 | Hw Comm Ltd | Cipher apparatus |
| US6947960B2 (en) * | 2002-02-21 | 2005-09-20 | Koninklijke Philips Electronics N.V. | Randomness test utilizing auto-correlation |
| WO2003104969A2 (en) * | 2002-06-06 | 2003-12-18 | Cryptico A/S | Method for improving unpredictability of output of pseudo-random number generators |
| BR0306297A (pt) * | 2002-09-09 | 2004-09-28 | Koninkl Philips Electronics Nv | Método para codificar uma mensagem gráfica, produto programa de computador, e, dispositivo para reconstruir uma mensagem gráfica baseada em uma sequência chave |
-
2004
- 2004-03-31 US US10/815,572 patent/US7505588B2/en active Active
-
2005
- 2005-01-31 AU AU2005200388A patent/AU2005200388B2/en not_active Ceased
- 2005-02-09 JP JP2005033533A patent/JP4728657B2/ja not_active Expired - Fee Related
- 2005-02-15 RU RU2005104020/09A patent/RU2390949C2/ru not_active IP Right Cessation
- 2005-02-18 BR BR0500539-6A patent/BRPI0500539A/pt not_active IP Right Cessation
- 2005-02-22 CA CA2497935A patent/CA2497935C/en not_active Expired - Fee Related
- 2005-02-25 CN CN2005100528418A patent/CN1677917B/zh not_active Expired - Fee Related
- 2005-02-25 KR KR1020050016004A patent/KR101143041B1/ko not_active Expired - Fee Related
- 2005-03-04 MX MXPA05002553A patent/MXPA05002553A/es active IP Right Grant
- 2005-03-24 DE DE602005020872T patent/DE602005020872D1/de not_active Expired - Lifetime
- 2005-03-24 AT AT05102396T patent/ATE466430T1/de not_active IP Right Cessation
- 2005-03-24 EP EP05102396A patent/EP1583278B1/en not_active Expired - Lifetime
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2005295507A5 (enExample) | ||
| Asharov et al. | OptORAMa: optimal oblivious RAM | |
| Chase et al. | Secret-shared shuffle | |
| Orrù et al. | Actively secure 1-out-of-N OT extension with application to private set intersection | |
| O’neill | PCG: A family of simple fast space-efficient statistically good algorithms for random number generation | |
| Dachman-Soled et al. | Locally Decodable and Updatable Non-malleable Codes and Their Applications: D. Dachman-Soled et al. | |
| JP2004505289A5 (enExample) | ||
| CA2497935A1 (en) | Stream cipher design with revolving buffers | |
| Lauritzen | Concrete abstract algebra: from numbers to Gröbner bases | |
| Agrawal et al. | Explicit non-malleable codes against bit-wise tampering and permutations | |
| Abraham et al. | Asymptotically tight bounds for composing ORAM with PIR | |
| Chen et al. | Bestie: Very practical searchable encryption with forward and backward security | |
| Ustimenko et al. | On extremal graph theory, explicit algebraic constructions of extremal graphs and corresponding Turing encryption machines | |
| Biham et al. | Py (Roo): A fast and secure stream cipher using rolling arrays | |
| Sadkhan et al. | Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory | |
| Moataz et al. | Chf-oram: a constant communication oram without homomorphic encryption | |
| Zheng et al. | FFT‐based multidimensional linear attack on PRESENT using the 2‐bit‐fixed characteristic | |
| JP2005031471A5 (enExample) | ||
| Koch et al. | Private function evaluation with cards | |
| Bhowmik et al. | An adaptive cryptosystem on a Finite Field | |
| Ustimenko et al. | On Graphs Defined by Equations and Cubic Multivariate Public Keys | |
| Moataz et al. | Constant Communication ORAM without Encryption. | |
| Aaraj et al. | Farasha: a provable permutation-based parallelizable PRF | |
| Siehler | The finite lamplighter groups: A guided tour | |
| Ebbe et al. | Multi-user non-locality amplification |