Method for key escrow in a communication system and...
Method for preventing inadvertent betrayal by a trustee of escro
Method for preventing key share attacks
Method of changing key fragments in a multi-step digital...
Methods and apparatus for providing networked cryptographic...
Methods and apparatus for recovering keys
Network system using a threshold secret sharing method
Network system, terminal, and method for encryption and...
Network system, terminal, and method for encryption and...
On-line randomness test for detecting irregular pattern
Protection against unintentional file changing
Publicly verifiable key recovery
Retrieval and transfer of encrypted hard drive content from...
Secret information management scheme based on secret sharing...
Secure instant messaging
Secure storage of private keys
Security countermeasures for power analysis attacks
Session key recovery system and method
System and method for backing-up data stored on a portable...
System and method for regenerating secret keys in diffie-hellman