2018
|
Invention
|
Method and system for key agreement utilizing semigroups. A method for key agreement between a fi... |
|
Invention
|
Method and system for selecting a secure prime for finite field diffie-hellman. A method for a Di... |
2017
|
Invention
|
Method and system for cheon resistant static diffie-hellman security. A method for providing Cheo... |
2016
|
Invention
|
Generating cryptographic function parameters from compact source code. Methods, systems, and comp... |
|
Invention
|
Generating cryptographic function parameters from a puzzle. Methods, systems, and computer progra... |
|
Invention
|
Generating cryptographic function parameters based on an observed astronomical event. Methods, sy... |
2015
|
Invention
|
Method for validating messages. There is provided a method for secure communications. The method ... |
2014
|
Invention
|
Securing method for lawful interception. A method is presented for secure communication, the meth... |
|
Invention
|
Accelerated signature verification on an elliptic curve.
A public key encryption system exchange... |
|
Invention
|
Implicit certificate scheme.
A method of generating a public key in a secure digital communicati... |
2013
|
Invention
|
Method of lawful interception for umts. A method of providing, to a user equipment, first informa... |
|
Invention
|
Key agreement for wireless communication. Methods, systems, and computer programs for performing ... |
|
Invention
|
Methods and devices for establishing trust on first use for close proximity communications. Metho... |
|
Invention
|
A system and method for providing a certificate-based trust framework using a secondary network. ... |
|
Invention
|
Authenticated encryption method using working blocks. A computer-implemented authenticated encryp... |
|
Invention
|
Method for securing broadcast messages. There is provided a method for secure communications. The... |
|
Invention
|
Method for securing messages. There is provided a method for secure communications. The method co... |
|
Invention
|
System and method for connecting client devices to a network. A system and method are provided fo... |
|
Invention
|
Modified sm2 elliptic curve signature algorithm supporting message recovery. A modified Chinese S... |
|
Invention
|
System and method of lawful access to secure communications. The present disclosure relates to sy... |
2012
|
Invention
|
Masked digital signatures. A method for creating and authenticating a digital signature is provid... |
|
Invention
|
Methods and devices for establishing trust on first use for close proximity communications.
Meth... |
|
Invention
|
Cryptographic document processing in a network. Data received over a network is processed by a se... |
|
Invention
|
Generating implicit certificates. Methods, systems, and computer programs for using an implicit c... |
|
Invention
|
Assessing cryptographic entropy. Systems, methods, software, and combinations thereof for evaluat... |
|
Invention
|
System and method for providing hardware-based security. In some implementations, a method for ma... |
|
Invention
|
Managing mobile device applications in a wireless network. Methods, systems, and computer program... |
|
Invention
|
Managing mobile device applications. Methods, systems, and computer programs for managing mobile ... |
|
Invention
|
Managing mobile device applications on a mobile device. Methods, systems, and computer programs f... |
|
Invention
|
Authentication procedures for managing mobile device applications. Methods, systems, and computer... |
|
Invention
|
Hybrid encryption schemes. Methods, systems, and computer programs for using hybrid encryption sc... |
|
Invention
|
Device authentication in a pki. A method for establishing a link key between correspondents in a ... |
|
Invention
|
Methods and apparatus for use in transferring an assignment of a secure chip between subscription... |
|
Invention
|
Implicit certificate scheme. A, A's private value and A's implicit certificate. |
|
Invention
|
System and method for accessing private networks. A system and method are provided for using a mo... |
|
Invention
|
Selectable object display method and apparatus.
A method includes displaying a selectable object... |
|
Invention
|
Implicitly certified public keys. Methods, systems, and computer programs for using an implicit c... |
|
Invention
|
Digital signatures with implicit certificate chains. Methods, systems, and computer programs for ... |
2011
|
Invention
|
Generating digital signatures. Methods, systems, and computer programs for generating a digital s... |
|
Invention
|
Cryptographic document processing in a network.
Data received over a network is processed by a s... |
|
Invention
|
Generating implicit certificates.
Methods, systems, and computer programs for using an implicit ... |
|
Invention
|
System and method for providing hardware-based security.
In some implementations, a method for m... |
|
Invention
|
System, device, and method for authentication of a user accessing an on-line resource. A system, ... |
|
Invention
|
Method for provisioning cryptographic keys during manufacturing. A method of manufacturing a comp... |
|
Invention
|
Data integrity for proximity-based communication. Methods, systems, and computer programs for tru... |
|
Invention
|
Squaring binary finite field elements. Methods and systems for squaring a binary finite field ele... |
|
Invention
|
Randomness for encryption operations. Methods, systems, and computer programs for generating rand... |