Method of cryptography with public key based on the discrete log
Method of data communication
Method of deriving a per-message signature for a DSS or El Gamal
Method of designing optimum encryption function and...
Method of detecting unauthorized use of a communication unit in
Method of detecting unauthorized use of a wireless communication
Method of dispatching secret keys to security modules and user c
Method of distributed IPMP device messaging and carriage of...
Method of distributing a decryption key in fixed-content data
Method of distributing computer data files
Method of effecting communications using common cryptokey
Method of effecting mutual authentication
Method of electronic payment by chip card by means of numbered t
Method of elliptic curve cryptographic digital signature...
Method of elliptic curve cryptographic key agreement using...
Method of elliptic curve cryptographic key exchange using...
Method of elliptic curve digital signature using coefficient...
Method of encoding a symbol or message on a plastic material and
Method of encoding confidentiality markings
Method of encoding information using a position-based...