Hacking prevention system
Hardware architecture for a configurable cipher device
Hardware arrangement for enciphering bit blocks while renewing a
Hardware implementation of the secure hash standard
Hash value generating method and device, data encryption method
Hash value generating method and device, data encryption...
Hashing using multiple sub-hashes
Hierarchical identity-based encryption and signature schemes
Hierarchical identity-based encryption and signature schemes
Hierarchical identity-based encryption and signature schemes
Hierarchical key management system
High performance programmable cryptography system
High speed configurable cryptographic architecture
High speed data encryption architecture
High speed modular exponentiator
High throughput system for encryption and other data operations
High-bandwidth encryption system with low-bandwidth cryptographi
How to sign digital streams
Hybrid data encryption
Hybrid public key algorithm/data encryption algorithm key distri