JP2011523103A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2011523103A5 JP2011523103A5 JP2011513515A JP2011513515A JP2011523103A5 JP 2011523103 A5 JP2011523103 A5 JP 2011523103A5 JP 2011513515 A JP2011513515 A JP 2011513515A JP 2011513515 A JP2011513515 A JP 2011513515A JP 2011523103 A5 JP2011523103 A5 JP 2011523103A5
- Authority
- JP
- Japan
- Prior art keywords
- computer
- input
- message
- key
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/136,772 | 2008-06-11 | ||
| US12/136,772 US8862893B2 (en) | 2008-06-11 | 2008-06-11 | Techniques for performing symmetric cryptography |
| PCT/US2009/041225 WO2009151793A2 (en) | 2008-06-11 | 2009-04-21 | Techniques for peforming symmetric cryptography |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2011523103A JP2011523103A (ja) | 2011-08-04 |
| JP2011523103A5 true JP2011523103A5 (enExample) | 2012-06-21 |
| JP5511803B2 JP5511803B2 (ja) | 2014-06-04 |
Family
ID=41417332
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2011513515A Expired - Fee Related JP5511803B2 (ja) | 2008-06-11 | 2009-04-21 | 対称暗号を実行するための技法 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US8862893B2 (enExample) |
| EP (1) | EP2286610B1 (enExample) |
| JP (1) | JP5511803B2 (enExample) |
| CN (1) | CN102067643B (enExample) |
| TW (1) | TWI488478B (enExample) |
| WO (1) | WO2009151793A2 (enExample) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100014673A1 (en) * | 2008-07-21 | 2010-01-21 | Electronics And Telecommunications Research Institute | Radio frequency identification (rfid) authentication apparatus having authentication function and method thereof |
| US20130239224A1 (en) * | 2008-08-06 | 2013-09-12 | True Security Llc | Method of locating a computing device |
| TWI408938B (zh) * | 2009-12-30 | 2013-09-11 | Univ Vanung | Flexible multi - digit signature method |
| WO2017030621A1 (en) * | 2015-05-27 | 2017-02-23 | Rubicon Labs, Inc. | Distributed and hierarchical device activation mechanisms |
| CN112507357B (zh) * | 2020-12-09 | 2024-03-29 | 华南理工大学 | 一种基于密钥生成器的多级接口设计方法 |
Family Cites Families (29)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5956505A (en) * | 1991-12-24 | 1999-09-21 | Pitney Bowes Inc. | Remote activation of software features in a data processing device |
| US5689565A (en) * | 1995-06-29 | 1997-11-18 | Microsoft Corporation | Cryptography system and method for providing cryptographic services for a computer application |
| US5778072A (en) * | 1995-07-07 | 1998-07-07 | Sun Microsystems, Inc. | System and method to transparently integrate private key operations from a smart card with host-based encryption services |
| AU1690597A (en) * | 1996-01-11 | 1997-08-01 | Mitre Corporation, The | System for controlling access and distribution of digital property |
| JPH10105620A (ja) | 1996-09-26 | 1998-04-24 | Sakura Ginkou:Kk | データ通信のためのセキュリティシステム |
| US6477203B1 (en) * | 1998-10-30 | 2002-11-05 | Agilent Technologies, Inc. | Signal processing distributed arithmetic architecture |
| GB2351829B (en) * | 1999-06-30 | 2003-04-30 | Ncr Int Inc | Self service terminal |
| JP4186381B2 (ja) | 2000-05-10 | 2008-11-26 | 日本電気株式会社 | プログラムを格納する記録媒体及びその実行方法 |
| US20020048371A1 (en) * | 2000-10-24 | 2002-04-25 | Ryuichi Iwamura | Method and system for secure digital decoder with secure key distribution |
| US7302571B2 (en) * | 2001-04-12 | 2007-11-27 | The Regents Of The University Of Michigan | Method and system to maintain portable computer data secure and authentication token for use therein |
| JP2003223098A (ja) | 2002-01-29 | 2003-08-08 | Sony Corp | ブーリアン・マトリクスに基づく暗号化処理方法、および復号処理方法、並びにデータ通信システム |
| US20030149869A1 (en) * | 2002-02-01 | 2003-08-07 | Paul Gleichauf | Method and system for securely storing and trasmitting data by applying a one-time pad |
| JP2003302899A (ja) * | 2002-04-11 | 2003-10-24 | Sony Corp | ブーリアン・マトリクスに基づく暗号化および復号処理方法、並びに装置 |
| CN1487750A (zh) * | 2002-09-30 | 2004-04-07 | 北京三星通信技术研究有限公司 | 多媒体广播与组播业务中密码的管理及分发方法 |
| US7003117B2 (en) | 2003-02-05 | 2006-02-21 | Voltage Security, Inc. | Identity-based encryption system for secure data distribution |
| KR100551992B1 (ko) | 2003-03-25 | 2006-02-20 | 소프트포럼 주식회사 | 어플리케이션 데이터의 암호화 및 복호화 방법 |
| US20050005100A1 (en) | 2003-04-23 | 2005-01-06 | Liqun Chen | Cryptographic method and system |
| US7275159B2 (en) | 2003-08-11 | 2007-09-25 | Ricoh Company, Ltd. | Multimedia output device having embedded encryption functionality |
| US7366299B2 (en) * | 2003-09-26 | 2008-04-29 | International Business Machines Corporation | Method for encrypting and decrypting data using derivative equations and factors |
| JP4895068B2 (ja) | 2004-03-29 | 2012-03-14 | 株式会社ハイパーテック | 処理装置及び処理方法 |
| US7624269B2 (en) * | 2004-07-09 | 2009-11-24 | Voltage Security, Inc. | Secure messaging system with derived keys |
| DE602005008101D1 (de) * | 2004-09-24 | 2008-08-21 | Synaptic Lab Ltd | S-boxen |
| US7831833B2 (en) * | 2005-04-22 | 2010-11-09 | Citrix Systems, Inc. | System and method for key recovery |
| US7437573B2 (en) * | 2005-06-03 | 2008-10-14 | Microsoft Corporation | Secure unsent message storage pending server connection |
| US20070101438A1 (en) * | 2005-10-28 | 2007-05-03 | Gunasekaran Govindarajan | Location-based authentication |
| US7853018B2 (en) | 2005-11-10 | 2010-12-14 | Atallah Mikhail J | Method and apparatus for hiding a private key |
| CN2847708Y (zh) * | 2006-04-30 | 2006-12-13 | 中国工商银行股份有限公司 | 利用特征码对关键数据进行加/解密的安全系统 |
| WO2008001327A2 (en) | 2006-06-30 | 2008-01-03 | Koninklijke Philips Electronics N.V. | Method and apparatus for encrypting/decrypting data |
| CN100428262C (zh) * | 2006-09-22 | 2008-10-22 | 中山大学 | 一种基于改进的一次一密乱码本的软件保护方法 |
-
2008
- 2008-06-11 US US12/136,772 patent/US8862893B2/en active Active
-
2009
- 2009-04-21 JP JP2011513515A patent/JP5511803B2/ja not_active Expired - Fee Related
- 2009-04-21 EP EP09763085.9A patent/EP2286610B1/en active Active
- 2009-04-21 CN CN200980123097.2A patent/CN102067643B/zh active Active
- 2009-04-21 WO PCT/US2009/041225 patent/WO2009151793A2/en not_active Ceased
- 2009-04-30 TW TW098114439A patent/TWI488478B/zh not_active IP Right Cessation
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11153068B2 (en) | Encryption device, encryption method, decryption device and decryption method | |
| US11546135B2 (en) | Key sequence generation for cryptographic operations | |
| EP2829010B1 (en) | Updating key information | |
| US20090323927A1 (en) | Mechanism for chained output feedback encryption | |
| CN113259329A (zh) | 一种数据不经意传输方法、装置、电子设备及存储介质 | |
| US9565018B2 (en) | Protecting cryptographic operations using conjugacy class functions | |
| US10305689B2 (en) | Encryption apparatus, decryption apparatus, cryptography processing system, encryption method, decryption method, encryption program, and decryption program | |
| US9729310B2 (en) | Scrambled counter mode for differential power analysis resistant encryption | |
| CN107534558A (zh) | 用于保护经由数据总线传输的数据的信息安全的方法以及数据总线系统 | |
| Kish et al. | Enhanced usage of keys obtained by physical, unconditionally secure distributions | |
| CN107437999A (zh) | 利用白盒密码算法的用于公钥加密的装置及方法 | |
| JP2011523103A5 (enExample) | ||
| WO2008114829A1 (ja) | 暗号装置、復号装置、暗号プログラム、復号プログラム、及び記録媒体 | |
| Singh et al. | Enhancing AES using novel block key generation algorithm and key dependent S-boxes | |
| CN114448603B (zh) | 混合式多阶运算加解密系统、发送端装置以及接收端装置 | |
| Mahantesh et al. | Design of secured block ciphers PRESENT and HIGHT algorithms and its FPGA implementation | |
| CN110474967B (zh) | 块链实验系统及方法 | |
| CN106506140A (zh) | 一种aes加解密方法和装置 | |
| Park et al. | Methods for practical whitebox cryptography | |
| Aissa et al. | An approach using stream cipher algorithm for image encryption and decryption | |
| Appaji et al. | Recent Advancements on symmetric cryptography techniques-A comprehensive Case Study | |
| Pancholi et al. | Cryptography: comparative studies of different symmetric algorithms | |
| Adebayo | A Multilevel Data Encryption Standard Cryptosystem with Residue Number System | |
| Zhang et al. | The research of applying chaos theory to speech communicating encryption system | |
| Banu | FPGA Based Hardware Implementation of Encryption Algorithm |