Protected cryptographic calculation
Protecting against security attack
Protection against power analysis attacks
Providing selective data broadcast receiver addressability
Provision of secure access to external resources from a distribu
Pseudo-random binary sequency generator
Pseudo-random one-to-one circuit synthesis
Pseudo-random transposition cipher system and method
Pseudorandom composition-based cryptographic authentication proc
Pseudorandom composition-based cryptographic authentication proc
Pseudorandom number generation and cryptographic authentication
Pseudorandom number generation and crytographic authentication
Pseudorandom, iterative method and apparatus for automatically c
Public and private key cryptographic method
Public key authentication and key agreement for low-cost termina
Public key cryptographic apparatus and method
Public key cryptographic apparatus and method
Public key cryptographic mechanism
Public key cryptographic system and method
Public key cryptographic system having differential security lev