Strengthened public key protocol
System and method for crypto-key generation and use in...
System and method for identity verification, forming joint signa
System and method for protecting data files by periodically...
System and method for providing secure sharing of electronic...
System and method for transferring the right to decode messages
System and method to transparently integrate private key operati
System and methods for data encryption using public key cryptogr
System and methods for data encryption using public key cryptogr
System for increasing the difficulty of password guessing attack
System for increasing the difficulty of password guessing attack
System of efficiently implementing secure hash algorithm...
Systems and methods for generating random addition chains
Systolic array for modular multiplication
Table driven method for calculating arithmetic inverse for...
Technique to support co-location and certification of...
Time delayed key escrow
Trapdoor one-way functions on elliptic curves and their...
Two-way public key authentication and key agreement for low-cost
Unpredictable blind signature systems