JP2018515812A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2018515812A5 JP2018515812A5 JP2017559636A JP2017559636A JP2018515812A5 JP 2018515812 A5 JP2018515812 A5 JP 2018515812A5 JP 2017559636 A JP2017559636 A JP 2017559636A JP 2017559636 A JP2017559636 A JP 2017559636A JP 2018515812 A5 JP2018515812 A5 JP 2018515812A5
- Authority
- JP
- Japan
- Prior art keywords
- input value
- encoded
- calculation
- rank
- encryption rank
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims 14
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP15168069.1 | 2015-05-19 | ||
| EP15168069 | 2015-05-19 | ||
| PCT/EP2016/060121 WO2016184695A1 (en) | 2015-05-19 | 2016-05-05 | Computing with encrypted values |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2018515812A JP2018515812A (ja) | 2018-06-14 |
| JP2018515812A5 true JP2018515812A5 (enExample) | 2018-11-22 |
| JP6499323B2 JP6499323B2 (ja) | 2019-04-10 |
Family
ID=53189697
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2017559636A Active JP6499323B2 (ja) | 2015-05-19 | 2016-05-05 | 暗号化された値での計算 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US10680796B2 (enExample) |
| EP (1) | EP3298720B1 (enExample) |
| JP (1) | JP6499323B2 (enExample) |
| CN (1) | CN107592963B (enExample) |
| WO (1) | WO2016184695A1 (enExample) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP7132926B2 (ja) * | 2017-01-05 | 2022-09-07 | コーニンクレッカ フィリップス エヌ ヴェ | コンパイルデバイス及びコンパイル方法 |
| US11190336B2 (en) * | 2019-05-10 | 2021-11-30 | Sap Se | Privacy-preserving benchmarking with interval statistics reducing leakage |
| US10976965B1 (en) * | 2020-10-14 | 2021-04-13 | First Capitol Consulting, Inc. | Optimization of in-memory processing of data represented by an acyclic graph so that the removal and re-materialization of data in selected nodes is minimized |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4278837A (en) | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
| JPS58116571A (ja) | 1981-12-29 | 1983-07-11 | 富士通株式会社 | マイクロコンピユ−タに於ける命令暗号化方式及びその実施に使用されるマイクロコンピユ−タ |
| US6594761B1 (en) | 1999-06-09 | 2003-07-15 | Cloakware Corporation | Tamper resistant software encoding |
| CA2327911A1 (en) * | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
| DE10201449C1 (de) | 2002-01-16 | 2003-08-14 | Infineon Technologies Ag | Rechenwerk, Verfahren zum Ausführen einer Operation mit einem verschlüsselten Operanden, Carry-Select-Addierer und Kryptographieprozessor |
| FR2875318A1 (fr) * | 2004-09-15 | 2006-03-17 | St Microelectronics Sa | Protection d'un algorithme des |
| US8150029B2 (en) | 2005-12-29 | 2012-04-03 | Proton World International N.V. | Detection of a disturbance in a calculation performed by an integrated circuit |
| IL180020A (en) | 2006-12-12 | 2013-03-24 | Waterfall Security Solutions Ltd | Encryption -and decryption-enabled interfaces |
| TWI385557B (zh) | 2006-12-25 | 2013-02-11 | Via Tech Inc | 應用於控制晶片之程式碼開發程式中之資料保護方法與工具程式 |
| JP2008233683A (ja) * | 2007-03-22 | 2008-10-02 | Toshiba Corp | 暗号処理装置及びプログラム |
| US8175265B2 (en) * | 2008-09-02 | 2012-05-08 | Apple Inc. | Systems and methods for implementing block cipher algorithms on attacker-controlled systems |
| WO2010146139A1 (en) * | 2009-06-19 | 2010-12-23 | Irdeto B.V. | White-box cryptographic system with configurable key using intermediate data modification |
| EP2520041B1 (fr) | 2009-12-30 | 2016-03-30 | Koninklijke Philips N.V. | Procede de generation de table de correspondance pour une boite blanche cryptographique |
| US8600048B1 (en) * | 2010-06-28 | 2013-12-03 | Voltage Security, Inc. | Format-translating encryption systems |
| US8718280B2 (en) * | 2010-12-17 | 2014-05-06 | Apple Inc. | Securing keys of a cipher using properties of the cipher process |
| US8775826B2 (en) | 2011-02-09 | 2014-07-08 | Apple Inc. | Counteracting memory tracing on computing systems by code obfuscation |
| US9189425B2 (en) * | 2011-09-01 | 2015-11-17 | Apple Inc. | Protecting look up tables by mixing code and operations |
| WO2013104969A1 (en) | 2012-01-09 | 2013-07-18 | Koninklijke Philips N.V. | Virtual machine device having key driven obfuscation and method |
| US9094471B2 (en) * | 2012-08-22 | 2015-07-28 | Certicom Corp. | Method of lawful interception for UMTS |
| BR112015014470A2 (pt) | 2012-12-21 | 2017-07-11 | Koninklijke Philips Nv | compilador configurado para compilar um programa de computador, dispositivo de computação configurado para executar um programa de computador compilado por um compilador, método para executar um programa de computador compilado por um compilador e programa de computador |
| CN104919750B (zh) | 2012-12-21 | 2017-06-06 | 皇家飞利浦有限公司 | 计算关于函数‑输入值的数据函数的计算设备和方法 |
| CN103745253B (zh) * | 2013-12-23 | 2016-06-15 | 宁波立芯射频股份有限公司 | 基于双芯片电子标签的加密校验方法 |
| CN104580160A (zh) * | 2014-12-16 | 2015-04-29 | 上海天奕达电子科技有限公司 | 一种信息交互方法及系统 |
-
2016
- 2016-05-05 EP EP16720841.2A patent/EP3298720B1/en active Active
- 2016-05-05 CN CN201680028803.5A patent/CN107592963B/zh active Active
- 2016-05-05 WO PCT/EP2016/060121 patent/WO2016184695A1/en not_active Ceased
- 2016-05-05 US US15/572,857 patent/US10680796B2/en active Active
- 2016-05-05 JP JP2017559636A patent/JP6499323B2/ja active Active
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2016523391A5 (enExample) | ||
| Mantas et al. | Analysis and extension of decision trees based on imprecise probabilities: Application on noisy data | |
| CN105046161B8 (zh) | 基于dna动态编码的彩色图像加密方法 | |
| JP2016144072A5 (ja) | 表示及び一時蓄積の処理方法 | |
| JP2016026438A5 (enExample) | ||
| JP2015006006A5 (enExample) | ||
| RU2016107391A (ru) | Устройство аутентифицированного шифрования, способ аутентифицированного шифрования и программа для аутентифицированного шифрования | |
| JP2016535310A5 (enExample) | ||
| JP6575532B2 (ja) | 暗号化装置、復号装置、暗号処理システム、暗号化方法、復号方法、暗号化プログラム、及び復号プログラム | |
| JP2014521152A5 (enExample) | ||
| SA520420762B1 (ar) | تقدير احتمالية مرجح فعال للتشفير الحسابي الثنائي | |
| RU2017107351A (ru) | Nado криптография с генераторами ключей | |
| JP2016508002A5 (enExample) | ||
| MX388600B (es) | Generación de secuencia de claves para operaciones criptográficas. | |
| JP2017508173A (ja) | デジタル値処理装置及び方法 | |
| JP2016512005A5 (enExample) | ||
| JP2018515812A5 (enExample) | ||
| Pouly et al. | Computational complexity of solving polynomial differential equations over unbounded domains | |
| US20160226660A1 (en) | Information processing apparatus, program, and storage medium | |
| JP2015194947A5 (enExample) | ||
| RU2698763C2 (ru) | Электронное вычислительное устройство | |
| WO2016073048A3 (en) | Protecting against malicious modification in cryptographic operations | |
| KR101617965B1 (ko) | 체계적인 극 부호 부호화기 | |
| TWI456542B (zh) | 密碼處理裝置、密碼處理方法及程式 | |
| JP6499323B2 (ja) | 暗号化された値での計算 |