Method for generating a read only memory image
Method for generating data for detection of tampering, and...
Method for generating digital watermarks for electronic...
Method for generating many-time restrictive blind signatures
Method for generating many-time restrictive blind signatures
Method for generating secure symmetric encryption and...
Method for generating unpredictable authentication...
Method for generation, delivery, and validation of...
Method for group unit encryption/decryption, and method and...
Method for hiding message data into media data and a method...
Method for identification of a user's unique identifier...
Method for indicating the integrity of a collection of...
Method for indivisibly modifying a plurality of sites in a...
Method for indivisibly modifying a plurality of sites in a...
Method for inserting a watermark signal into data
Method for integrating online and offline cryptographic...
Method for interchange of cryptographic codes between a...
Method for key agreement for a cryptographic secure...
Method for loading an application in a device, device and...
Method for logically binding and verifying a subassembly in...