JP2005295507A5 - - Google Patents

Download PDF

Info

Publication number
JP2005295507A5
JP2005295507A5 JP2005033533A JP2005033533A JP2005295507A5 JP 2005295507 A5 JP2005295507 A5 JP 2005295507A5 JP 2005033533 A JP2005033533 A JP 2005033533A JP 2005033533 A JP2005033533 A JP 2005033533A JP 2005295507 A5 JP2005295507 A5 JP 2005295507A5
Authority
JP
Japan
Prior art keywords
walk
storage units
value
random
readable media
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2005033533A
Other languages
English (en)
Japanese (ja)
Other versions
JP2005295507A (ja
JP4728657B2 (ja
Filing date
Publication date
Priority claimed from US10/815,572 external-priority patent/US7505588B2/en
Application filed filed Critical
Publication of JP2005295507A publication Critical patent/JP2005295507A/ja
Publication of JP2005295507A5 publication Critical patent/JP2005295507A5/ja
Application granted granted Critical
Publication of JP4728657B2 publication Critical patent/JP4728657B2/ja
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

JP2005033533A 2004-03-31 2005-02-09 回転バッファを用いたストリーム暗号設計 Expired - Fee Related JP4728657B2 (ja)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/815,572 US7505588B2 (en) 2004-03-31 2004-03-31 Stream cipher design with revolving buffers
US10/815,572 2004-03-31

Publications (3)

Publication Number Publication Date
JP2005295507A JP2005295507A (ja) 2005-10-20
JP2005295507A5 true JP2005295507A5 (enExample) 2008-03-27
JP4728657B2 JP4728657B2 (ja) 2011-07-20

Family

ID=34887748

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2005033533A Expired - Fee Related JP4728657B2 (ja) 2004-03-31 2005-02-09 回転バッファを用いたストリーム暗号設計

Country Status (12)

Country Link
US (1) US7505588B2 (enExample)
EP (1) EP1583278B1 (enExample)
JP (1) JP4728657B2 (enExample)
KR (1) KR101143041B1 (enExample)
CN (1) CN1677917B (enExample)
AT (1) ATE466430T1 (enExample)
AU (1) AU2005200388B2 (enExample)
BR (1) BRPI0500539A (enExample)
CA (1) CA2497935C (enExample)
DE (1) DE602005020872D1 (enExample)
MX (1) MXPA05002553A (enExample)
RU (1) RU2390949C2 (enExample)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7853018B2 (en) * 2005-11-10 2010-12-14 Atallah Mikhail J Method and apparatus for hiding a private key
US7907726B2 (en) * 2006-01-19 2011-03-15 Microsoft Corporation Pseudorandom number generation with expander graphs
DE102006030325B4 (de) * 2006-06-30 2009-12-31 Gerhard Kosel Verfahren für die Konstruktion eines Schlüsselstrom-Generators zur Erzeugung von Pseudo-Zufallszahlen für kryptographische Anwendungen
KR100885994B1 (ko) * 2006-11-09 2009-03-03 한국전자통신연구원 비선형 필터링된 t함수에 기반한 스트림 암호화 장치 및방법
US8036377B1 (en) * 2006-12-12 2011-10-11 Marvell International Ltd. Method and apparatus of high speed encryption and decryption
KR100931581B1 (ko) * 2007-12-06 2009-12-14 한국전자통신연구원 Tsc-4 스트림 암호 연산을 수행하기 위한 장치
US8588408B2 (en) * 2008-12-19 2013-11-19 France Telecom Method of implementing a block cipher algorithm
US8719593B2 (en) * 2009-05-20 2014-05-06 Harris Corporation Secure processing device with keystream cache and related methods
KR101588279B1 (ko) * 2009-05-26 2016-01-25 삼성전자주식회사 무선 통신 시스템에서 데이터 암호화 방법 및 장치
EA021803B1 (ru) * 2012-04-25 2015-09-30 Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" (Оао "Инфотекс") Способ шифрования данных для вычислительных платформ с simd-архитектурой
US9584488B2 (en) 2013-08-09 2017-02-28 Introspective Power, Inc. Data encryption cipher using rotating ports
US9584313B2 (en) 2013-08-09 2017-02-28 Introspective Power, Inc. Streaming one time pad cipher using rotating ports for data encryption
US20160105276A1 (en) * 2014-10-10 2016-04-14 Qualcomm Incorporated Rotation-based cipher
RU2595921C1 (ru) * 2015-03-12 2016-08-27 Евгения Александровна Алисевич Способ усиления радиосигналов путем управляемой регенерации
US11955988B2 (en) * 2015-12-28 2024-04-09 Vivek Sathyanarayana Nittoor System and method for generation of error-correcting codes in communication systems
RU2706463C1 (ru) * 2018-07-14 2019-11-19 Хаджимурат Магомедович Гаджиев Способ кодирования информации в компьютерных сетях с использованием переменного PIN-кода, наборов случайных чисел и функциональных преобразований, проводимых синхронно для передающей и принимающей сторон
RU2710669C1 (ru) * 2018-11-06 2019-12-30 Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" Способ шифрования данных
CN112764782B (zh) * 2021-01-28 2024-07-05 维沃移动通信有限公司 应用程序的更新方法、应用程序的更新装置

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2091983C1 (ru) * 1993-02-09 1997-09-27 Геннадий Николаевич Чижухин Способ шифрования двоичной информации и устройство для его осуществления
US5604806A (en) * 1995-01-20 1997-02-18 Ericsson Inc. Apparatus and method for secure radio communication
US5724427A (en) * 1995-08-17 1998-03-03 Lucent Technologies Inc. Method and apparatus for autokey rotor encryption
CA2302784A1 (en) * 1997-09-17 1999-03-25 Frank C. Luyster Improved block cipher method
US6252958B1 (en) * 1997-09-22 2001-06-26 Qualcomm Incorporated Method and apparatus for generating encryption stream ciphers
US6496928B1 (en) * 1998-01-07 2002-12-17 Microsoft Corporation System for transmitting subscription information and content to a mobile device
US6646639B1 (en) * 1998-07-22 2003-11-11 Nvidia Corporation Modified method and apparatus for improved occlusion culling in graphics systems
US6560338B1 (en) * 1998-08-28 2003-05-06 Qualcomm Incorporated Limiting delays associated with the generation of encryption stream ciphers
US7170997B2 (en) * 2000-12-07 2007-01-30 Cryptico A/S Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data
EP2627008A3 (en) * 2000-12-29 2013-09-11 Intel Mobile Communications GmbH Channel codec processor configurable for multiple wireless communications standards
AU2002327528A1 (en) * 2001-08-22 2003-03-10 Qualcomm, Incorporated Method and apparatus for increasing the accuracy and speed of correlation attacks
GB0123302D0 (en) * 2001-09-28 2001-11-21 Hw Comm Ltd Cipher apparatus
US6947960B2 (en) * 2002-02-21 2005-09-20 Koninklijke Philips Electronics N.V. Randomness test utilizing auto-correlation
WO2003104969A2 (en) * 2002-06-06 2003-12-18 Cryptico A/S Method for improving unpredictability of output of pseudo-random number generators
BR0306297A (pt) * 2002-09-09 2004-09-28 Koninkl Philips Electronics Nv Método para codificar uma mensagem gráfica, produto programa de computador, e, dispositivo para reconstruir uma mensagem gráfica baseada em uma sequência chave

Similar Documents

Publication Publication Date Title
JP2005295507A5 (enExample)
Asharov et al. OptORAMa: optimal oblivious RAM
Chase et al. Secret-shared shuffle
Orrù et al. Actively secure 1-out-of-N OT extension with application to private set intersection
O’neill PCG: A family of simple fast space-efficient statistically good algorithms for random number generation
Dachman-Soled et al. Locally Decodable and Updatable Non-malleable Codes and Their Applications: D. Dachman-Soled et al.
JP2004505289A5 (enExample)
CA2497935A1 (en) Stream cipher design with revolving buffers
Lauritzen Concrete abstract algebra: from numbers to Gröbner bases
Agrawal et al. Explicit non-malleable codes against bit-wise tampering and permutations
Abraham et al. Asymptotically tight bounds for composing ORAM with PIR
Chen et al. Bestie: Very practical searchable encryption with forward and backward security
Ustimenko et al. On extremal graph theory, explicit algebraic constructions of extremal graphs and corresponding Turing encryption machines
Biham et al. Py (Roo): A fast and secure stream cipher using rolling arrays
Sadkhan et al. Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory
Moataz et al. Chf-oram: a constant communication oram without homomorphic encryption
Zheng et al. FFT‐based multidimensional linear attack on PRESENT using the 2‐bit‐fixed characteristic
JP2005031471A5 (enExample)
Koch et al. Private function evaluation with cards
Bhowmik et al. An adaptive cryptosystem on a Finite Field
Ustimenko et al. On Graphs Defined by Equations and Cubic Multivariate Public Keys
Moataz et al. Constant Communication ORAM without Encryption.
Aaraj et al. Farasha: a provable permutation-based parallelizable PRF
Siehler The finite lamplighter groups: A guided tour
Ebbe et al. Multi-user non-locality amplification