$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Public key cryptosystem method and apparatus 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/28
  • H04L-009/30
출원번호 US-0914449 (1997-08-19)
발명자 / 주소
  • Hoffstein Jeffrey
  • Pipher Jill
  • Silverman Joseph H.
출원인 / 주소
  • NTRU Cryptosystems, Inc.
대리인 / 주소
    Novack
인용정보 피인용 횟수 : 108  인용 특허 : 15

초록

The public key encryption system of the present invention has short and easily created encryption keys and wherein the encoding and decoding processes are performed extremely rapidly, and has low memory requirements. The encoding and decoding processes use both the addition and multiplication operat

대표청구항

[ We claim:] [1.] A method for encoding and decoding a digital message m, comprising the steps of:selecting ideals p and q of a ring R;generating elements f and g of the ring R, and generating element F.sub.q which is an inverse of f (mod q), and generating element F.sub.p which is an inverse of f (

이 특허에 인용된 특허 (15)

  1. Patarin Jacques,FRX, Cryptographic communication process.
  2. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  3. Kravitz David W. (Owings Mills MD), Digital signature algorithm.
  4. Rueppel Rainer A. (Wetzikon CHX) Nyberg Kaisa (Vienna ATX), Digital signature method and key agreement method.
  5. Shamir Adi (Rehovot ILX), Efficient signature scheme based on birational permutations.
  6. Riek Justus (Glen Cove NY) McFarland Gregory (Port Jefferson NY), Error correcting public key cryptographic method and program.
  7. Micali Silvio (224 Upland Rd. Cambridge MA 02140), Fair cryptosystems and methods of use.
  8. Crandall Richard E., Method and apparatus for digital signature authentication.
  9. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305) Bach Carl E. (Albany CA), Method and apparatus for use in public-key data encryption system.
  10. Herzberg Amir (Bronx NY) Jarecki Stanislaw M. (Cambridge MA) Krawczyk Hugo M. (Riverdale NY) Yung Marcel M. (New York NY), Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret s.
  11. Brickell Ernest F. (Albuquerque NM) Gordon Daniel M. (San Diego CA) McCurley Kevin S. (Albuquerque NM), Method for exponentiating in cryptographic systems.
  12. Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
  13. Miyaji Atsuko (Kawachinagano JPX) Tatebayashi Makoto (Takarazuka JPX), Method of privacy communication using elliptic curves.
  14. Anshel Michael M. (New York NY) Goldfeld Dorian (Tenafly NJ), Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions.
  15. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.

이 특허를 인용한 특허 (108)

  1. Schmitt, Erich, Abstraction and de-abstraction of a digital data stream.
  2. Kaminaga,Masahiro; Endo,Takashi; Watanabe,Takashi, Attack-resistant implementation method.
  3. Ohya, Masanori; Iriyama, Satoshi; Accardi, Luigi; Regoli, Massimo, Common secret key generation device, encryption device, decryption device, common secret key generation method, encryption method, decryption method, and program.
  4. Ronald Fink, Compression of data transmission by use of prime exponents.
  5. Hawkes, Philip Michael; Quick, Roy Franklin; Rose, Gregory Gordon, Cryptosystem for communication networks.
  6. Koh,Jee H., Cryptosystems using commuting pairs in a monoid.
  7. Moskowitz, Scott A., Data protection method and device.
  8. Moskowitz, Scott A., Data protection method and device.
  9. Moskowitz, Scott A., Data protection method and device.
  10. Moskowitz, Scott A., Data protection method and device.
  11. Hoffstein,Jeffrey; Howgrave Graham,Nicholas A.; Pipher,Jill C.; Silverman,Joseph H.; Whyte,William J., Digital signature and authentication method and apparatus.
  12. Hoffstein, Jeffrey; Pipher, Jill; Schanck, John M; Silverman, Joseph H; Whyte, William J, Digital signature method.
  13. Hoffstein, Jeffrey; Schanck, John M; Silverman, Joseph H; Whyte, William J, Digital signature technique.
  14. Futa, Yuichi; Yamamichi, Masato; Yamamichi, legal representative, Masami; Yamamichi, legal representative, Satomi; Yamamichi, legal representative, Keiko; Ohmori, Motoji; Tatebayashi, Makoto, Encryption communication system.
  15. Nonaka, Masao; Futa, Yuichi; Yokota, Kaoru; Matsuzaki, Natsume, Encryption device and encryption system.
  16. Futa, Yuichi; Yamamichi, Masato; Yamamichi, legal representative, Masami; Yamamichi, legal representative, Satomi; Yamamichi, legal representative, Keiko; Ohmori, Motoji, Encryption system, encryption device, decryption device, program, and integrated circuit.
  17. Charles M. Doland, Encryption technique using stream cipher and block cipher.
  18. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  19. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  20. Kraus, Eric M., Identification bracelet.
  21. Boneh, Dan; Boyen, Xavier, Identity-based-encryption system.
  22. Felsher, David Paul, Information record infrastructure, system and method.
  23. Kuhn, Brian Gerald; Skinner, Craig S., Key for a wireless-enabled device.
  24. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  25. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  26. Carr, Jeffery Dean, Memory controller with performance-modulated security.
  27. Vanstone,Scott A.; Proos,John A.; Struik,Marinus, Method and apparatus for protecting NTRU against a timing attack.
  28. Trimberger, Stephen M., Method and apparatus for protecting proprietary configuration data for programmable logic devices.
  29. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  30. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  31. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  32. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  33. Alao,Rachad, Method and system for accelerated data encryption.
  34. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  35. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  36. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  37. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  38. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  39. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  40. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  41. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  42. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  43. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  44. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  45. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  46. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  47. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  48. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  49. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  50. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  51. Hoffberg, Steven M., Multifactorial optimization system and method.
  52. Stedron, Robert Allen, Multiple level security system and method for encrypting data within documents.
  53. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  54. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  55. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  56. Futa,Yuichi; Ohmori,Motoji; Yokota,Kaoru; Tatebayashi,Makoto, Numerical array output device, a numerical array output method, an encryption device, and a decryption device.
  57. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  58. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  59. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  60. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  61. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  62. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  63. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  64. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  65. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  66. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  67. Teranisi,Isamu, Padding application method ensuring security of cryptosystem and encryptor/decryptor.
  68. Slavin,Keith R, Public key cryptography using matrices.
  69. Slavin,Keith R, Public key cryptography using matrices.
  70. Kuhn, Brian Gerald; Skinner, Craig S., Registration of a mobile computing device for a data service on a wireless network.
  71. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  72. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  73. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  74. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  75. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  76. Hoffstein, Jeffrey; Silverman, Joseph H.; Lieman, Daniel, Secure user identification based on ring homomorphisms.
  77. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  78. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  79. Futa, Yuichi; Shizuya, Hiroki; Isobe, Shuji; Hasegawa, Shingo, Signature and verification method, signature generation device, and signature verification device.
  80. Futa, Yuichi; Hasegawa, Shingo; Isobe, Shuji; Ohmori, Motoji; Shizuya, Hiroki, Signature generation device and signature verification device.
  81. Futa, Yuichi; Hasegawa, Shingo; Isobe, Shuji; Ohmori, Motoji; Shizuya, Hiroki, Signature generation device, key generation device, and signature generation method.
  82. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  83. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  84. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  85. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  86. Hoffberg, Steven M., System and method for determining contingent relevance.
  87. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  88. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  89. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  90. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  91. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  92. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  93. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  94. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  95. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  96. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  97. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  98. Moskowitz,Scott A.; Berry,Michael W., System and methods for permitting open access to data objects and for securing data within the data objects.
  99. Stedron, Robert Allen; Chmielewski, John L., System for transmitting encrypted data.
  100. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  101. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  102. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  103. Dick, Stephen G.; Bolourchi, Nader; Shin, Sung-Hyuk, User equipment identification specific scrambling.
  104. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  105. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  106. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  107. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  108. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로