Method for implementing a private-key communication protocol...
Method for implementing the chinese remainder theorem
Method for improving a random number generator to make it...
Method for improving the processing and storage performance of d
Method for key distribution using quantum cryptography
Method for key management of point-to-point communications
Method for loading and utilizing a key in a secure transmission
Method for loading encryption keys into secure transmission devi
Method for making secure one or several computer...
Method for message authentication from non-malleable crypto syst
Method for monitoring a signal to be transmitted via at least on
Method for obtaining a securitized cleartext attestation in a di
Method for obtaining authenticity identification devices for usi
Method for over the air rekeying of multiple communication group
Method for performing group exclusion in hierarchical group stru
Method for performing iterative scalar multiplication which...
Method for personalization of an active card
Method for point-to-point communications within secure communica
Method for preventing inadvertent betrayal by a trustee of escro
Method for processing a digital signal in a so-called secure com