UA67860C2 - Method for coding and decoding data - Google Patents
Method for coding and decoding data Download PDFInfo
- Publication number
- UA67860C2 UA67860C2 UA2002021660A UA2002021660A UA67860C2 UA 67860 C2 UA67860 C2 UA 67860C2 UA 2002021660 A UA2002021660 A UA 2002021660A UA 2002021660 A UA2002021660 A UA 2002021660A UA 67860 C2 UA67860 C2 UA 67860C2
- Authority
- UA
- Ukraine
- Prior art keywords
- module
- encryption
- decryption
- differs
- modules
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000011144 upstream manufacturing Methods 0.000 claims abstract description 5
- 238000004458 analytical method Methods 0.000 description 7
- 230000008878 coupling Effects 0.000 description 6
- 238000010168 coupling process Methods 0.000 description 6
- 238000005859 coupling reaction Methods 0.000 description 6
- 239000000523 sample Substances 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000004880 explosion Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000009412 basement excavation Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004061 bleaching Methods 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000013478 data encryption standard Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000035939 shock Effects 0.000 description 1
- 238000012731 temporal analysis Methods 0.000 description 1
- 230000002087 whitening effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/005—Countermeasures against attacks on cryptographic mechanisms for timing attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Infusion, Injection, And Reservoir Apparatuses (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CH157399 | 1999-08-30 | ||
PCT/IB2000/001157 WO2001017159A1 (fr) | 1999-08-30 | 2000-08-24 | Methode d'encryptage multi-modules |
Publications (1)
Publication Number | Publication Date |
---|---|
UA67860C2 true UA67860C2 (en) | 2004-07-15 |
Family
ID=27792847
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
UA2002021660A UA67860C2 (en) | 1999-08-30 | 2000-08-24 | Method for coding and decoding data |
Country Status (8)
Country | Link |
---|---|
US (1) | US7190790B1 (es) |
AR (1) | AR025429A1 (es) |
JO (1) | JO2271B1 (es) |
MY (1) | MY133728A (es) |
PA (1) | PA8501701A1 (es) |
TW (1) | TW546935B (es) |
UA (1) | UA67860C2 (es) |
ZA (1) | ZA200201394B (es) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7617158B2 (en) * | 2004-03-22 | 2009-11-10 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for digital rights management of electronic content |
US7496753B2 (en) * | 2004-09-02 | 2009-02-24 | International Business Machines Corporation | Data encryption interface for reducing encrypt latency impact on standard traffic |
US7409558B2 (en) * | 2004-09-02 | 2008-08-05 | International Business Machines Corporation | Low-latency data decryption interface |
JP4107673B2 (ja) * | 2005-02-10 | 2008-06-25 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 通信中継システム、制御方法、プログラム、及び情報処理システム |
US7940926B2 (en) * | 2006-06-08 | 2011-05-10 | Novell, Inc. | Cooperative encoding of data by pluralities of parties |
WO2009033248A1 (en) * | 2007-09-10 | 2009-03-19 | Novell, Inc. | A method for efficient thread usage for hierarchically structured tasks |
US9081953B2 (en) | 2012-07-17 | 2015-07-14 | Oracle International Corporation | Defense against search engine tracking |
WO2024112340A1 (en) * | 2022-11-23 | 2024-05-30 | SafeMoon US, LLC | System and method of securing a server using elliptic curve cryptography |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5365589A (en) * | 1992-02-07 | 1994-11-15 | Gutowitz Howard A | Method and apparatus for encryption, decryption and authentication using dynamical systems |
FR2718311A1 (fr) * | 1994-03-30 | 1995-10-06 | Trt Telecom Radio Electr | Dispositif de mise en Óoeuvre d'un système de signature de message et carte à puce comportant un tel dispositif. |
GB2288519A (en) * | 1994-04-05 | 1995-10-18 | Ibm | Data encryption |
US5594797A (en) | 1995-02-22 | 1997-01-14 | Nokia Mobile Phones | Variable security level encryption |
DE19539700C1 (de) | 1995-10-25 | 1996-11-28 | Siemens Ag | Sicherheitschip |
US5768390A (en) * | 1995-10-25 | 1998-06-16 | International Business Machines Corporation | Cryptographic system with masking |
US5742686A (en) * | 1996-06-14 | 1998-04-21 | Finley; Phillip Scott | Device and method for dynamic encryption |
US5933501A (en) * | 1996-08-01 | 1999-08-03 | Harris Corporation | `Virtual` encryption scheme combining different encryption operators into compound-encryption mechanism |
US5901303A (en) * | 1996-12-27 | 1999-05-04 | Gemplus Card International | Smart cards, systems using smart cards and methods of operating said cards in systems |
US6240183B1 (en) * | 1997-06-19 | 2001-05-29 | Brian E. Marchant | Security apparatus for data transmission with dynamic random encryption |
US6128735A (en) * | 1997-11-25 | 2000-10-03 | Motorola, Inc. | Method and system for securely transferring a data set in a data communications system |
US6330675B1 (en) * | 1998-02-13 | 2001-12-11 | Liquid Audio, Inc. | System and method for secure transfer of digital data to a local recordable storage medium |
DE69936856T2 (de) * | 1998-06-03 | 2008-04-30 | Cryptography Research Inc., San Francisco | Ausgewogene kryptographische rechenmethode und apparat zur schlupfminimierung in smartcards und anderen kryptosystemen |
AU6381799A (en) * | 1998-06-03 | 2000-01-10 | Cryptography Research, Inc. | Secure modular exponentiation with leak minimization for smartcards and other cryptosystems |
IL139935A (en) * | 1998-06-03 | 2005-06-19 | Cryptography Res Inc | Des and other cryptographic processes with leak minimization for smartcards and other cryptosystems |
-
2000
- 2000-08-17 TW TW089116663A patent/TW546935B/zh not_active IP Right Cessation
- 2000-08-21 JO JO2000148A patent/JO2271B1/en active
- 2000-08-24 US US10/069,714 patent/US7190790B1/en not_active Expired - Lifetime
- 2000-08-24 UA UA2002021660A patent/UA67860C2/uk unknown
- 2000-08-28 MY MYPI20003948 patent/MY133728A/en unknown
- 2000-08-29 AR ARP000104484A patent/AR025429A1/es active IP Right Grant
- 2000-08-30 PA PA20008501701A patent/PA8501701A1/es unknown
-
2002
- 2002-02-19 ZA ZA200201394A patent/ZA200201394B/en unknown
Also Published As
Publication number | Publication date |
---|---|
AR025429A1 (es) | 2002-11-27 |
PA8501701A1 (es) | 2002-02-21 |
MY133728A (en) | 2007-11-30 |
TW546935B (en) | 2003-08-11 |
US7190790B1 (en) | 2007-03-13 |
ZA200201394B (en) | 2003-02-19 |
JO2271B1 (en) | 2005-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Courtois et al. | Stealth address and key management techniques in blockchain systems | |
CN103986583A (zh) | 一种动态加密方法及其加密通信系统 | |
KR20240093634A (ko) | 암호화 복호화 방법, 장치 및 매체 | |
CN109995520A (zh) | 基于深度卷积神经网络的密钥传输方法、图像处理平台 | |
CN101931527A (zh) | 对反直观量子密钥分配系统的单光子分束攻击方法 | |
UA67860C2 (en) | Method for coding and decoding data | |
CN106027560A (zh) | 一种面向智能终端的安全传输方法及系统 | |
Achuthshankar et al. | A novel symmetric cryptography algorithm for fast and secure encryption | |
CN114567427A (zh) | 一种区块链隐蔽数据分段传输方法 | |
WO2017114739A1 (en) | System and method for hiding a cryptographic secret using expansion | |
Kondo et al. | An Extended Version of the Polybius Cipher | |
Lin et al. | A genetic algorithm for ciphertext-only attack in cryptanalysis | |
Gaur et al. | A comparative study and analysis of cryptographic algorithms: RSA, DES, AES, BLOWFISH, 3-DES, and TWOFISH | |
CN111915290A (zh) | 一种iOS系统下基于密钥拆分保护的移动支付密码键盘及其实现方法 | |
KR20020041807A (ko) | 다중-모듈 암호화 방법 | |
Kandul et al. | Steganography with cryptography in android | |
CN117955637B (zh) | 数据加密方法及装置、数据解密方法及装置 | |
Yakubu et al. | Audio secret management scheme using shamir’s secret sharing | |
Kim et al. | A cryptanalytic view of the NSA’s Skipjack block cipher design | |
Zneit et al. | Secure Method to Protect Secret Short Messages using Rearrangement Key | |
RU2325766C2 (ru) | Способ защиты информации | |
JP2000115157A (ja) | 紛失通信方法 | |
Samid | Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers | |
Sangeetha et al. | Email Protection in the Digital Age: Evaluating Symmetric Cryptographic Algorithms | |
Singh et al. | 64. RSA ENCRYPTION |