JP2018515812A5 - - Google Patents

Download PDF

Info

Publication number
JP2018515812A5
JP2018515812A5 JP2017559636A JP2017559636A JP2018515812A5 JP 2018515812 A5 JP2018515812 A5 JP 2018515812A5 JP 2017559636 A JP2017559636 A JP 2017559636A JP 2017559636 A JP2017559636 A JP 2017559636A JP 2018515812 A5 JP2018515812 A5 JP 2018515812A5
Authority
JP
Japan
Prior art keywords
input value
encoded
calculation
rank
encryption rank
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2017559636A
Other languages
English (en)
Japanese (ja)
Other versions
JP6499323B2 (ja
JP2018515812A (ja
Filing date
Publication date
Application filed filed Critical
Priority claimed from PCT/EP2016/060121 external-priority patent/WO2016184695A1/en
Publication of JP2018515812A publication Critical patent/JP2018515812A/ja
Publication of JP2018515812A5 publication Critical patent/JP2018515812A5/ja
Application granted granted Critical
Publication of JP6499323B2 publication Critical patent/JP6499323B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

JP2017559636A 2015-05-19 2016-05-05 暗号化された値での計算 Active JP6499323B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP15168069.1 2015-05-19
EP15168069 2015-05-19
PCT/EP2016/060121 WO2016184695A1 (en) 2015-05-19 2016-05-05 Computing with encrypted values

Publications (3)

Publication Number Publication Date
JP2018515812A JP2018515812A (ja) 2018-06-14
JP2018515812A5 true JP2018515812A5 (enExample) 2018-11-22
JP6499323B2 JP6499323B2 (ja) 2019-04-10

Family

ID=53189697

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2017559636A Active JP6499323B2 (ja) 2015-05-19 2016-05-05 暗号化された値での計算

Country Status (5)

Country Link
US (1) US10680796B2 (enExample)
EP (1) EP3298720B1 (enExample)
JP (1) JP6499323B2 (enExample)
CN (1) CN107592963B (enExample)
WO (1) WO2016184695A1 (enExample)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7132926B2 (ja) * 2017-01-05 2022-09-07 コーニンクレッカ フィリップス エヌ ヴェ コンパイルデバイス及びコンパイル方法
US11190336B2 (en) * 2019-05-10 2021-11-30 Sap Se Privacy-preserving benchmarking with interval statistics reducing leakage
US10976965B1 (en) * 2020-10-14 2021-04-13 First Capitol Consulting, Inc. Optimization of in-memory processing of data represented by an acyclic graph so that the removal and re-materialization of data in selected nodes is minimized

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4278837A (en) 1977-10-31 1981-07-14 Best Robert M Crypto microprocessor for executing enciphered programs
JPS58116571A (ja) 1981-12-29 1983-07-11 富士通株式会社 マイクロコンピユ−タに於ける命令暗号化方式及びその実施に使用されるマイクロコンピユ−タ
US6594761B1 (en) 1999-06-09 2003-07-15 Cloakware Corporation Tamper resistant software encoding
CA2327911A1 (en) * 2000-12-08 2002-06-08 Cloakware Corporation Obscuring functions in computer software
DE10201449C1 (de) 2002-01-16 2003-08-14 Infineon Technologies Ag Rechenwerk, Verfahren zum Ausführen einer Operation mit einem verschlüsselten Operanden, Carry-Select-Addierer und Kryptographieprozessor
FR2875318A1 (fr) * 2004-09-15 2006-03-17 St Microelectronics Sa Protection d'un algorithme des
US8150029B2 (en) 2005-12-29 2012-04-03 Proton World International N.V. Detection of a disturbance in a calculation performed by an integrated circuit
IL180020A (en) 2006-12-12 2013-03-24 Waterfall Security Solutions Ltd Encryption -and decryption-enabled interfaces
TWI385557B (zh) 2006-12-25 2013-02-11 Via Tech Inc 應用於控制晶片之程式碼開發程式中之資料保護方法與工具程式
JP2008233683A (ja) * 2007-03-22 2008-10-02 Toshiba Corp 暗号処理装置及びプログラム
US8175265B2 (en) * 2008-09-02 2012-05-08 Apple Inc. Systems and methods for implementing block cipher algorithms on attacker-controlled systems
WO2010146139A1 (en) * 2009-06-19 2010-12-23 Irdeto B.V. White-box cryptographic system with configurable key using intermediate data modification
EP2520041B1 (fr) 2009-12-30 2016-03-30 Koninklijke Philips N.V. Procede de generation de table de correspondance pour une boite blanche cryptographique
US8600048B1 (en) * 2010-06-28 2013-12-03 Voltage Security, Inc. Format-translating encryption systems
US8718280B2 (en) * 2010-12-17 2014-05-06 Apple Inc. Securing keys of a cipher using properties of the cipher process
US8775826B2 (en) 2011-02-09 2014-07-08 Apple Inc. Counteracting memory tracing on computing systems by code obfuscation
US9189425B2 (en) * 2011-09-01 2015-11-17 Apple Inc. Protecting look up tables by mixing code and operations
WO2013104969A1 (en) 2012-01-09 2013-07-18 Koninklijke Philips N.V. Virtual machine device having key driven obfuscation and method
US9094471B2 (en) * 2012-08-22 2015-07-28 Certicom Corp. Method of lawful interception for UMTS
BR112015014470A2 (pt) 2012-12-21 2017-07-11 Koninklijke Philips Nv compilador configurado para compilar um programa de computador, dispositivo de computação configurado para executar um programa de computador compilado por um compilador, método para executar um programa de computador compilado por um compilador e programa de computador
CN104919750B (zh) 2012-12-21 2017-06-06 皇家飞利浦有限公司 计算关于函数‑输入值的数据函数的计算设备和方法
CN103745253B (zh) * 2013-12-23 2016-06-15 宁波立芯射频股份有限公司 基于双芯片电子标签的加密校验方法
CN104580160A (zh) * 2014-12-16 2015-04-29 上海天奕达电子科技有限公司 一种信息交互方法及系统

Similar Documents

Publication Publication Date Title
JP2016523391A5 (enExample)
Mantas et al. Analysis and extension of decision trees based on imprecise probabilities: Application on noisy data
CN105046161B8 (zh) 基于dna动态编码的彩色图像加密方法
JP2016144072A5 (ja) 表示及び一時蓄積の処理方法
JP2016026438A5 (enExample)
JP2015006006A5 (enExample)
RU2016107391A (ru) Устройство аутентифицированного шифрования, способ аутентифицированного шифрования и программа для аутентифицированного шифрования
JP2016535310A5 (enExample)
JP6575532B2 (ja) 暗号化装置、復号装置、暗号処理システム、暗号化方法、復号方法、暗号化プログラム、及び復号プログラム
JP2014521152A5 (enExample)
SA520420762B1 (ar) تقدير احتمالية مرجح فعال للتشفير الحسابي الثنائي
RU2017107351A (ru) Nado криптография с генераторами ключей
JP2016508002A5 (enExample)
MX388600B (es) Generación de secuencia de claves para operaciones criptográficas.
JP2017508173A (ja) デジタル値処理装置及び方法
JP2016512005A5 (enExample)
JP2018515812A5 (enExample)
Pouly et al. Computational complexity of solving polynomial differential equations over unbounded domains
US20160226660A1 (en) Information processing apparatus, program, and storage medium
JP2015194947A5 (enExample)
RU2698763C2 (ru) Электронное вычислительное устройство
WO2016073048A3 (en) Protecting against malicious modification in cryptographic operations
KR101617965B1 (ko) 체계적인 극 부호 부호화기
TWI456542B (zh) 密碼處理裝置、密碼處理方法及程式
JP6499323B2 (ja) 暗号化された値での計算