Method for fast decryption of processor instructions in an...
Method for storing and operating on data units in a security...
Method for the execution of an encryption program for the...
Method of software protection using a random code generator
Method to protect secrets against encrypted section attack
Methods and apparatus for automated export compliance
Methods and apparatus for secure programming and storage of...
Methods and circuits for allowing encrypted and unencrypted...
Microprocessor apparatus and method for optimizing block...
Microprocessor in which logic changes during execution
Microprocessor instruction result obfuscation
Non-volatile semiconductor memory that prevents unauthorized...
One-time pad Encryption key Distribution
Permutation of opcode values for application program...
Program writable integrated circuit card and method therefore
Reflected interrupt for hardware-based encryption
Secure computational outsourcing techniques
Secure CPU and memory management unit with cryptographic...
Secure execution of downloaded software
Secure virtual machine monitor to tear down a secure...