$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Differential power analysis—resistant cryptographic processing 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • G06F-001/32
  • G06F-007/00
  • G06F-021/55
  • G06F-021/75
  • G06F-021/77
  • G06K-019/073
  • G06Q-020/34
  • G07F-007/08
  • G07F-007/10
  • G06F-001/06
  • G09C-001/00
출원번호 US-0530905 (2014-11-03)
등록번호 US-9419790 (2016-08-16)
발명자 / 주소
  • Kocher, Paul C.
  • Jaffe, Joshua M.
  • Jun, Benjamin C.
출원인 / 주소
  • Cryptography Research, Inc.
대리인 / 주소
    Finnegan, Henderson, Farabow, Garrett & Dunner, LLP
인용정보 피인용 횟수 : 0  인용 특허 : 222

초록

Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electric

대표청구항

1. A device for securely performing a cryptographic operation involving a secret, comprising: an input to receive a quantity to be processed;a source of unpredictable information; anda processor to perform the cryptographic operation using the secret and the received quantity, wherein the cryptograp

이 특허에 인용된 특허 (222)

  1. Ina Hiroyuki (Kariya JPX) Mori Hidehito (Anjo JPX), Anti-theft device having minimal power consumption characteristics.
  2. Hadad Isaac,ILX ; Arazi Benjamin,ILX ; Gressel Carmi David,ILX ; Dror Itai,ILX, Apparatus & method for modular multiplication & exponentiation based on Montgomery multiplication.
  3. Gressel, Carmi David; Hadad, Isaac; Dror, Itai; Molchanov, Alexey; Mostovoy, Michael, Apparatus and method for modular multiplication and exponentiation based on montgomery multiplication.
  4. Timson Colin J.,GBX ; Yap Chas Hock Eng,GBX ; Kelly Sean,GBX, Apparatus and method for providing access to secured data or area.
  5. Connell Lawrence Edwin ; Rakers Patrick Lee ; Collins Timothy James ; Lemersal ; Jr. Donald Bernard, Apparatus and method for reducing energy fluctuations in a portable data device.
  6. Davies Donald W. (Sunbury-on-Thames GB2), Apparatus and methods for granting access to computers.
  7. Kagami Naoyuki (Fujisawa JPX) Kubo Hiroaki (Atsugi JPX) Takekoshi Makoto (Yokohama JPX), Apparatus for controlling a optical disk drive.
  8. Simon Blake-Wilson GB; Donald Johnson ; Alfred Menezes CA, Authenticated key agreement protocol.
  9. Silverbrook, Kia, Authentication chip with protection from power supply attacks.
  10. Markowski Dale W. (West Milwaukee WI) Khamharn Oddy N. (Gurnee IL) Bianco Mark E. (Pomona CA), Authentication method for keyless entry system.
  11. Ohno Hisashi (Itami JPX), Authentication method performed between IC card and terminal unit and system therefor.
  12. Jaffe, Joshua M.; Kocher, Paul C.; Jun, Benjamin C., Balanced cryptographic computational method and apparatus for leak minimizational in smartcards and other cryptosystems.
  13. Fielder Guy L ; Alito Paul N, Bilateral authentication and information encryption token system and method.
  14. Kowalski Jacek (Trets FRX), Binary logic level electrical detector namely to prevent the detection of secret codes contained in a memory card.
  15. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91306), Blind signature systems.
  16. Knudson Mark B. (Arden Hills MN), Blood constituent measurement.
  17. Bowman Philip J. ; Monte Paul A. ; Wiedeman Robert A., Broadcast data access controller communication system.
  18. Aucsmith David W. (Portland OR), Broadcast key distribution apparatus and method using Chinese Remainder.
  19. Jacobs Eino (Palo Alto CA), CMOS integrated circuit having improved power-supply filtering.
  20. Bosnyak Robert J. ; Drost Robert J., CMOS integrated circuit regulator for reducing power supply noise.
  21. Wipff Frank P. (Garland TX), Cadence suppression system.
  22. Kong Bai-Sun,KRX, Charge recycling differential logic (CRDL) circuit and devices using the same.
  23. Constant ; James N., Cipher computer and cryptographic system.
  24. Yates Joseph W. (Duluth GA) Cosson Michael S. (Duluth GA), Circuit and method for minimizing electromagnetic emissions.
  25. Ebihara Hidenori,JPX ; Kawazaki Kiyoto,JPX, Circuit and system for modulo exponentiation arithmetic and arithmetic method of performing modulo exponentiation arith.
  26. Mohel Moshe (Havazelet Nasharon St. Kfar Saba ILX), Circuit for securing a power supply.
  27. Sprunk Eric (Carlsbad CA), Clock frequency modulation for secure microprocessors.
  28. Griffin William R. (South Burlington VT) Heller Lawrence G. (South Burlington VT), Clocked differential cascode voltage switch logic systems.
  29. Davis Terry L. (Scottsdale AZ) Hart James A. (Radnor PA) O\Malley Michael F. (Glenside PA) Russell James F. (Hockessin DE) Sears John W. (Peoria AZ) Trice Philip H. (Phoenix AZ), Collection of value from stored value systems.
  30. Davis Terry L. (Scottsdale AZ) Russell James F. (Hockessin DE) Sears John W. (Peoria AZ) Trice Philip H. (Phoenix AZ), Common cryptographic key verification in a transaction network.
  31. Yamamoto Takahisa,JPX, Communication apparatus and a communication system.
  32. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Compact endorsement signature systems.
  33. Ganesan Ravi, Computer system for securing communications using split private key asymmetric cryptography.
  34. Hall David W. (Satellite Beach FL) Dooley J. G. (Melbourne FL) Hernandez Arecio A. (Melbourne FL), Constant delay logic circuits and methods.
  35. Cohn Martin (Arlington MA) Welch Terry A. (Concord MA) Lempel Abraham (Haifa ILX), Coset code generator for computer memory protection.
  36. Obermeier Siegfried (Unterschleissheim DEX) Bergner Peter (Obeschleissheim DEX), Crypto equipment.
  37. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  38. Scheidt Edward M. ; Wack C. Jay, Cryptographic communication process and apparatus.
  39. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  40. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Cryptographic computation using masking to prevent differential power analysis and other attacks.
  41. Moreau Thierry,CAXITX H1M 2A1, Cryptographic data integrity with serial bit processing and pseudo-random generators.
  42. Singer, Ari P., Cryptographic device having reduced vulnerability to side-channel attack and method of operating same.
  43. Kocher, Paul C.; Rohatgi, Pankaj; Jaffe, Joshua M., Cryptographic device with resistance to differential power analysis and other external monitoring attacks.
  44. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Sahulka Richard J. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for multiple domain networks.
  45. Crandall, Richard Eugene, Cryptographic system using chaotic dynamics.
  46. Horne Donald R. (Don Mills CAX) Jeffers John M. (Downsview CAX), Cryptographic system using interchangeable key blocks and selectable key fragments.
  47. Inou Kiyoharu (Tokyo JPX) Matsumura Hideaki (Tokyo JPX) Saito Hitoshi (Tokyo JPX), DC/DC converter.
  48. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems.
  49. Griffin ; III Roy A. (Oceanside CA) Esserman James N. (San Diego CA) Anderson Steven E. (La Jolla CA) Hart Steven R. (Encinitas CA) Katznelson Ron D. (San Diego CA), Determination of time of execution of predetermined data processing routing in relation to occurrence of prior externall.
  50. Liu Zunquan (13687 Paseo Cardiel #A San Diego CA 92129-2875), Device and method for data encryption.
  51. Ugon Michel (Saint-Ouen FRX), Device for the protection of access to a permanent memory of a portable data carrier.
  52. Feyt, Nathalie; Benoit, Olivier; Naccache, David, Devices for hiding operations performed in a microprocesser card.
  53. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis.
  54. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis.
  55. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis method and apparatus.
  56. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  57. Theogarajan Luke, Differential precharge circuit.
  58. Davida George I. (Milwaukee WI) Wells David L. (Milwaukee WI), Digital data enciphering and deciphering circuit and method.
  59. Fletcher James C. Administrator of the National Aeronautics and Space Administration ; with respect to an invention of ( La Canada CA) Engel Alexander (La Canada CA) Springer L. Richard (Glendale CA), Digital data reformatter/deserializer.
  60. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Digital document time-stamping with catenate certificate.
  61. Johnston ; Paul M. ; Szabo ; Andras I., Digital processing and calculating AC electric energy metering system.
  62. Riddle Herbert S. (2025 NW. Northrup ; Suite 317 Portland OR 97209) Bodio Mark (4025 S. 45th Pl. Phoenix AZ 85040), Digital word-framing technique and system.
  63. Malek Charles J. (Crystal Lake IL), Dummy traffic generation.
  64. Elmasry Mohamed,CAX ; Allam Mohamed,CAX, Dynamic current mode logic family.
  65. Fette Bruce A. (Mesa AZ) DaBell Steve D. (Tempe AZ), Dynamically configurable switched capacitor power supply and method.
  66. Akiyama Ryota (Kawasaki JPX) Hasebe Takayuki (Kawasaki JPX), Electronic cashless transaction system.
  67. Akiyama Ryota (Kawasaki JPX) Hasebe Takayuki (Kawasaki JPX), Electronic cashless transaction system.
  68. Keiichi Iwamura JP, Electronic credit system and communication apparatus.
  69. Furuta Noritoshi,JPX ; Goto Masahiro,JPX, Enciphering system applicable to various keyless entry systems.
  70. Reiner Robert,DEX, Encoding device.
  71. Jones Michael F. (Nashua NH), Encrypted data transmission system employing means for randomly altering the encryption keys.
  72. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  73. Wade Jack (La Jolla CA) Szaroletta William K. (Des Moines IA) Madden Thomas R. (San Diego CA), Enhanced security system for computing devices.
  74. Jaffe, Joshua M.; Kocher, Paul C.; Jun, Benjamin C., Hardware-level mitigation and DPA countermeasures for cryptographic devices.
  75. Moore Charles H. (Woodside CA) Fish ; III Russell H. (Mt. View CA), High performance, low cost microprocessor architecture.
  76. Matsumura Hidekazu (Okegawa JPX) Yorimoto Yoshikazu (Tokyo JPX), High-security integrated-circuit card.
  77. Yoshida Hiroya (Uji JPX), IC card having improved security checking function.
  78. Mark E. Bianco, In-line decryption for protecting embedded software.
  79. Davis Terry L. (Scottsdale AZ) Hart James A. (Radnor PA) Russell James F. (Hockessin DE) Sears John W. (Peoria AZ) Trice Philip H. (Phoenix AZ), Information consolidation within a transaction network.
  80. Ugon Michel,FRX, Integrated circuit and method for decorrelating an instruction sequence of a program.
  81. Shona Yoshihiro,JPX, Integrated circuit for embedding in smart cards, and method of issuing smart cards.
  82. Lisimaque Gilles (Peynier FRX) Fruhauf Serge (Peynier FRX), Integrated circuit for the confidential storage and processing of data, comprising a device against fraudulent use.
  83. Michael Allen Kaczmarski, Intermediate user-interface definition method and system.
  84. Gressel Carmi David (Kvutzat Urim ILX) Dror Itai (Beersheva ILX), Internationally regulated system for one to one cryptographic communications with national sovereignty without key escro.
  85. Miller Bruce J. (13 Doe La. Malvern PA 19355) Gadonas Gus C. (R.D. #2 Phoenixville PA 19460) Donofrio Frank C. (720 Buttonwood St. Norristown PA 19401), Isolator/switching assembly for data processing terminal.
  86. Campbell ; Jr. Carl M. (Newtown Square PA), Key management system for on-line communication.
  87. Lewis Tony, Key replacement in a public key cryptosystem.
  88. Campbell ; Jr. Carl M. (Newtown Square PA), Key variable generator for an encryption/decryption device.
  89. Reed Irving S. (Santa Monica CA) Yin Xiaowei (Alhambra CA) Chen Xuemin (Los Angeles CA), Keyless entry system using a rolling code.
  90. Kocher, Paul C., Leak-resistant cryptographic indexed key update.
  91. Kocher Paul C. ; Jaffe Joshua M., Leak-resistant cryptographic method and apparatus.
  92. Paul C. Kocher ; Joshua M. Jaffe, Leak-resistant cryptographic method and apparatus.
  93. Kocher,Paul C.; Jaffe,Joshua M., Leak-resistant cryptographic payment smartcard.
  94. Hall David W. (Satellite Beach FL) Dooley J. G. (Melbourne FL) Hernandez Arecio A. (Melbourne FL), Low noise logic family.
  95. Allstot David J. (Pittsburgh PA) Kiasei Sayfe (Corvallis OR), MOS folded source-coupled logic.
  96. Degele Steven T. (1501 7th Ave. West Williston ND 58801), Machine generation of cryptographic keys by non-linear processes similar to processes normally associated with encryptio.
  97. Nossen Edward J. (Cherry Hill NJ), Masked data transmission system.
  98. Canetti Ran (Tel Aviv NY ILX) Herzberg Amir (New York NY), Mechanism for keeping a key secret from mobile eavesdroppers.
  99. Kaufman Charles W. (Northborough MA) Perlman Radia J. (Acton MA), Message encryption using a hash function.
  100. Rybicki Mathew A. (Austin TX), Method and apparatus for a DC-DC converter an current limiting thereof.
  101. Blomgren James S. ; Potter Terence M. ; Horne Stephen C. ; Seningen Michael R. ; Petro Anthony M., Method and apparatus for a N-nary logic circuit using 1 of 4 signals.
  102. Blomgren James S. ; Potter Terence M. ; Horne Stephen C. ; Seningen Michael R. ; Petro Anthony M., Method and apparatus for a N-nary logic circuit using 1 of N signals.
  103. Horne Stephen C. ; Seningen Michael R. ; Blomgren James S., Method and apparatus for a RAM circuit having N-Nary output interface.
  104. Blomgren James S. ; Potter Terence M. ; Horne Stephen C. ; Seningen Michael R. ; Petro Anthony M., Method and apparatus for a logic circuit with constant power consumption.
  105. Lee Alson ; Sloan Jerry F. ; Wentzein Irwin H., Method and apparatus for acquiring access using a fast smart card transaction.
  106. Denno Rodney Grant ; Johnson Lance James, Method and apparatus for asymetric key management in a cryptographic system.
  107. Brown Scott K. (San Jose CA) Hoem Robert H. (Fremont CA), Method and apparatus for changing the master key in a cryptographic system.
  108. Jakobsson Markus, Method and apparatus for encrypting, decrypting, and providing privacy for data values.
  109. Rogaway Phillip W. (Austin TX), Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks.
  110. Aiello William A. ; Venkatesan Ramarathnam, Method and apparatus for generating secure hash functions.
  111. Graunke Gary L. ; Aucsmith David W., Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation.
  112. Curiger Andreas ; Little Wendell, Method and apparatus for masking modulo exponentiation calculations in an integrated circuit.
  113. Lambert Francis, Method and apparatus for non-intrusive biometric capture.
  114. Lindholm Per (Stockholm SEX), Method and apparatus for preventing external detection of signal information.
  115. Lindholm Per (Stockholm SEX), Method and apparatus for preventing extraneous detection of signal information.
  116. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Method and apparatus for preventing piracy of digital content.
  117. Shamir Adi,ILX, Method and apparatus for protecting public key schemes from timing and fault attacks.
  118. Richards William James, Method and apparatus for providing hierarchical key system in restricted-access television system.
  119. Crandall Richard E. (Portland OR), Method and apparatus for public key exchange in a cryptographic system.
  120. Van De Pavert Hendricus J. W. M.,NLX, Method and apparatus for recording usage data of card operated devices.
  121. Seningen Michael R. ; Blomgren James S. ; Potter Terence M., Method and apparatus for routing 1 of 4 signals.
  122. Schwartz Edward L. (Sunnyvale CA) Gormish Michael J. (Los Altos CA), Method and apparatus for securing executable programs against copying.
  123. Wuidart Sylvie,BEX, Method and apparatus for sequencing an integrated circuit.
  124. Mittenthal Lothrop, Method and apparatus for statistical diffusion in iterated block substitution.
  125. Aziz Ashar (Fremont CA), Method and apparatus for stepping pair keys in a key-management scheme.
  126. Griffin John T. (Doylestown PA) Grubb ; III David (Doylestown PA) Hamilton Jeffrey S. (Doylestown PA), Method and apparatus for television signal scrambling using a line expansion technique.
  127. Rhoads Geoffrey B., Method and apparatus responsive to a code signal conveyed through a graphic image.
  128. Mehta Gaurav G. ; Harris David ; Singh S. Deo, Method and apparatus to interface monotonic and non-monotonic domino logic.
  129. Lisimaque Gilles (Potomac MD) Geronimi Francois (Aix En Provence FRX), Method and device to increase the protection of a chip card.
  130. Herzberg Amir (Bronx NY) Jarecki Stanislaw M. (Cambridge MA) Krawczyk Hugo M. (Riverdale NY) Yung Marcel M. (New York NY), Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret s.
  131. Hauser Ralf,CHX ; Janson Philippe,CHX ; Molva Refik,FRX ; Tsudik Gene,CHX ; Van Herreweghen Elsie,CHX, Method and system for changing an authorization password or key in a distributed communication network.
  132. Jenkins Lew ; Pasetes ; Jr. Emmanuel K., Method and system for providing secure EDI over an open network.
  133. Rhelimi Alain,FRX ; Rigal Vincent,FRX ; Rose Rene,FRX, Method for determining an encryption key associated with an integrated circuit.
  134. Treharne William David (Farmington Hills MI), Method for operating a vehicle security system including code comparison after starting which counts start attempts.
  135. Glitz Ekkehard (Backnang DEX), Method for preventing “compromising radiation”.
  136. Mueller Kurt H. (Wallisellen CHX), Method for secure session key generation.
  137. Schwenk Joerg,DEX, Method for securing system protected by a key hierarchy.
  138. M'Raihi David,FRX ; Naccache David,FRX ; Stern Jacques,FRX ; Vaudenay Serge,FRX, Method of cryptography with public key based on the discrete logarithm.
  139. Pieterse Rob,NLX ; Rombaut Willem,NLX, Method of debiting an electronic payment means.
  140. Cedric Colnot FR, Method of enabling a server to authorize access to a service from portable devices having electronic microcircuits, e.g. devices of the smart card type.
  141. Hoppe Joseph (Les Molieres FRX), Method of generating a unique number for a smart card and its use for the cooperation of the card with a host system.
  142. Feiken Albertus,NLX, Method of making recoverable smart card transactions, a method of recovering such a transaction, as well as a smart card allowing recoverable transactions.
  143. Merkle Ralph C. (Mountain View CA), Method of providing digital signatures.
  144. Pogue ; Jr. Russell W. (Kokomo IN) Rivest Ronald L. (Arlington MA), Method of secure remote access.
  145. Salle,Patrick, Method to prevent power dissipation attacks on a cryptographic algorithm by implementing a random transformation step.
  146. Hohle William ; Petit Frederic, Methods and apparatus for a travel-related multi-function smartcard.
  147. Garcken Knute T. ; Strawbridge Charles E. ; Kisylia Andrew Philip, Methods for generating variable S-boxes from arbitrary keys of arbitrary length including methods which allow rapid key.
  148. Komatsu Fumiaki (Kobe JPX), Microwave melting furnace for treating liquid.
  149. Kelly Michael Gene, Modem with automatic callback provisions.
  150. Hesson James H. (Chittenden County VT) Espy Steven C. (Chittenden County VT), Modular 64-bit integer adder.
  151. Kawamura Shinichi,JPX, Modular exponentiation calculation apparatus and method.
  152. Meyr Heinrich (Aachen DEX) Georges Claude (Mnsingen CHX), Mosaic printer.
  153. Lo Tin-Chee (Fishkill NY), Multi-functional differential cascode voltage switch logic.
  154. David Chaum ; Niels Ferguson NL; Jelte Van Der Hoek NL, Multi-purpose transaction card system.
  155. Chen Wei ; Hwang Wei ; Kudva Prabhakar Nandavar, Multi-threshold-voltage differential cascode voltage switch (DCVS) circuits.
  156. Richards, William James, Multiple keys for decrypting data in restricted-access television system.
  157. Beausoleil William F. (Hopewell Junction NY) Ng Tak-Kwong (Hyde Park NY) Palmer Harold R. (Poughkeepsie NY), Multiprocessor for hardware emulation.
  158. Buer Mark Leonard, Muti-cycle non-parallel data encryption engine.
  159. Thomlinson Matthew W. ; Simon Daniel R. ; Yee Bennet, Non-biased pseudo random number generator.
  160. Matyas Stephen M. (Kingston NY), Offline PIN validation with DES.
  161. Hill Robert J., Optimal ring antenna determination system.
  162. Kolbert Melvin (Boca Raton FL), Parallel transmission to mask data radiation.
  163. Ferreira Ronald,FRX, Payment scheme for a mobile communication service.
  164. Caputo Anthony A. (Coatesville PA) Amoruso Victor P. (Cumberland MD), Pocket encrypting and authenticating communications device.
  165. Ugon Michel (Saint-Ouen FRX), Portable data carrier including a microprocessor.
  166. Tamada Masuo (Yokohama JPX) Tanaka Tsutomu (Tokyo JPX) Matsuoka Hideo (Yokohama JPX), Portable electronic apparatus capable of confirming validity of transaction data.
  167. Pacella Angelo M. (Annandale VA), Portable secure-telephone communications module.
  168. Ohnishi Masahito (Kadoma JPX) Kataoka Shozo (Kadoma JPX) Kanda Takashi (Kadoma JPX) Yamasaki Takashi (Kadoma JPX) Yoshida Kazuo (Kadoma JPX), Power converter.
  169. Saeki Mitsuo (Kawasaki JPX) Ozawa Hidekiyo (Kawasaki JPX) Yano Hidetoshi (Kawasaki JPX), Power supply unit.
  170. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Prevention of side channel attacks against block cipher implementations and other cryptographic systems.
  171. Moulart Yves,BEX ; Dawirs Michel,BEX, Process and device for permitting selective access to a security system.
  172. M\Raihi David (Paris FRX) Naccache David (Maisons-Alfort FRX), Process for generating DSA signatures with low-cost portable apparatuses.
  173. Gilardi Giovanni (Turin ITX) Scarazini Severino (Turin ITX), Protective device for computers and the like.
  174. Aiello William Anthony ; Venkatesan Ramarathnam, Pseudo-random generator.
  175. Collins Thomas ; Hopkins Dale ; Langford Susan ; Sabin Michael, Public key cryptographic apparatus and method.
  176. Austin Jeffrey R. (Hindhead GB2), Public key diversification method.
  177. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  178. Bennett Charles H. (Croton-on-Hudson NY) Wiesner Stephen J. (Mitzpe Ramon ILX), Quantum key distribution using non-orthogonal macroscopic signals.
  179. Schulz Raymond A. (Manassas VA), Random number generator circuit.
  180. Busby Bruce E. (Mountain View CA), Recursive key schedule cryptographic system.
  181. Latka David S. (Dearborn MI), Resynchronizing transmitters to receivers for secure vehicle entry using cryptography or rolling code.
  182. Michaels Paul A. (Livonia MI), Rolling code encryption process for remote keyless entry system.
  183. Waraksa Thomas J. (Clarkston MI) Michaels Paul A. (Livonia MI) Slaughter Sherri A. (Troy MI) Poirier James A. (Sterling Heights MI) Rea Irvin B. (Royal Oak MI), Rolling code for a keyless entry system.
  184. Raith Krister A. (Durham NC), Rolling key resynchronization in cellular verification and validation system.
  185. Fruhauf Serge (Peynier FRX) Sourgen Laurent (Aix en Provence FRX), Safety device against the unauthorized detection of protected data.
  186. Markham Thomas R., Scalable key agile cryptography.
  187. Tatebayashi Makoto,JPX ; Ohmori Motoji,JPX ; Kato Takehisa,JPX ; Endoh Naoki,JPX ; Hirayama Koichi,JPX, Secret key transfer method which is highly secure and can restrict the damage caused when the secret key is leaked or decoded.
  188. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT), Secure computer communication method and system.
  189. Brands Stefanus Alfonsus (Ina Boudier-Bakkerlaan 143 (iii) XW Utrecht NLX 3582 ), Secure cryptographic methods for electronic transfer of information.
  190. Keathley Kimberly Ann ; Chen Ann-Pin ; McCusker Nancy, Secure electronic commerce employing integrated circuit cards.
  191. Kocher Paul C. ; Jaffe Joshua M., Secure modular exponentiation with leak minimization for smartcards and other cryptosystems.
  192. Trieger Andrew W., Secure session tracking method and system for client-server environment.
  193. Morgan Stephen P. ; Russell Lance W. ; Reed Benjamin Clay, Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same.
  194. Shiba Hiroshi (Tokyo JPX) Mikoshiba Hiroaki (Tokyo JPX), Semiconductor integrated circuit having a capacitor for stabilizing a voltage at a power supplying wiring.
  195. Pathak Saroj ; Pathak Jagdish, Semiconductor memory having a current balancing circuit.
  196. Brown Harold J. (Lorain OH), Semiconductor switching circuit with clamping and energy recovery features.
  197. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  198. Pailles Jean-Claude (Epron FRX) Depret Eric (Caen FRX) Hiolle Philippe (Hrouville St Clair FRX), Smart card updating process.
  199. Chaney John William, Smart-card based access control system with improved security.
  200. Ramus Richard S. (Austin TX) Lundberg James R. (Austin TX), Standard cell having a capacitor and a power supply capacitor for reducing noise and method of formation.
  201. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  202. Uchimura Kuniharu (Saitama JPX) Iwata Atushi (Saitama JPX), Switched capacitor circuit with high power supply projection ratio.
  203. Adams Carlisle M. (Ottawa CAX), Symmetric cryptographic system for data encryption.
  204. Leech Marcus D.,CAX, Symmetric cryptographic system for data encryption.
  205. Saltwick John M. (Phoenix AZ) Scarinci Dean (Glendale AZ) Sparks William O. (Cave Creek AZ) Gates Geoffrey W. (Phoenix AZ), System and method for communications security protection.
  206. Wade Paul C. (Shirley MA) Duncan Samuel H. (Arlington MA) Smelser Donald W. (Bolton MA), System and method for error detection and reducing simultaneous switching noise.
  207. Spratte Michael, System and method for generation of one-time encryption keys for data communications and a computer program product for.
  208. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
  209. Nakamura Lance S. ; Roberts Alan B. ; Sheets John F.,FRX, System and method for revaluation of stored tokens in IC cards.
  210. Kia Silverbrook AU; Simon Robert Walmsley AU; Paul Lapstun AU, System for authenticating physical objects.
  211. Crowther Gerald O. (Sutton GB2) Brennand Peter R. (London GB2), System for decoding transmitted scrambled signals.
  212. Cohen Michael,ILX, System for memory unit receiving pseudo-random delay signal operative to access memory after delay and additional delay.
  213. Iijima Yasuo (Yokohama JPX), System for mutually certifying an IC card and an IC card terminal.
  214. Dunlavy John H. (Colorado Springs CO), System for preventing remote detection of computer data from tempest signal emissions.
  215. Hoivik Lars (Nesoya NOX), System for protecting digital equipment against remote access.
  216. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  217. Hill Jake,GBX, Transaction system.
  218. Akiyama Ryota (Kawasaki JPX) Torii Naoya (Kawasaki JPX) Iwayama Noboru (Kawasaki JPX) Utsumi Kenichi (Kawasaki JPX), Transformation pattern generating device and encryption function device.
  219. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Using unpredictable information to minimize leakage from smartcards and other cryptosystems.
  220. Ritter Terry F., Variable size block ciphers.
  221. Kocher, Paul C.; Rohatgi, Pankaj; Jaffe, Joshua M., Verifiable, leak-resistant encryption and decryption.
  222. Van Eck Willem (Leiden NLX), Video terminal with image line disarrangement.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로