Method of carrying out an authentication check between a base st
Method of compressing a cryptographic value
Method of cryptographically transforming electronic digital data
Method of cryptography with public key based on the discrete log
Method of deriving a per-message signature for a DSS or El Gamal
Method of designing optimum encryption function and...
Method of detecting unauthorized use of a communication unit in
Method of detecting unauthorized use of a wireless communication
Method of dispatching secret keys to security modules and user c
Method of distributing computer data files
Method of effecting communications using common cryptokey
Method of effecting mutual authentication
Method of electronic payment by chip card by means of numbered t
Method of elliptic curve cryptographic digital signature...
Method of elliptic curve cryptographic key agreement using...
Method of elliptic curve digital signature using coefficient...
Method of encoding information using a position-based...
Method of establishing a radio link in one of a plurality of cha
Method of executing an irregular permutation of data protected b
Method of generating a unique number for a smart card and its us