Hierarchical identity-based encryption and signature schemes
Hierarchical identity-based encryption and signature schemes
Hierarchical key management system
High performance programmable cryptography system
High speed configurable cryptographic architecture
High speed data encryption architecture
High speed modular exponentiator
High throughput system for encryption and other data operations
High-bandwidth encryption system with low-bandwidth cryptographi
How to sign digital streams
Hybrid data encryption
Hybrid public key algorithm/data encryption algorithm key distri
IC card
IC card and authentication method for information processing app
IC card equipped with elliptic curve encryption processing...
IC card equipped with elliptical curve encryption processing...
IC card system
IC card system having a function of authenticating destroyed dat
IC memory card and method of protecting data therein
ID protected memory with a maskable ID template