Cryptographic methods for remote authentication
Cryptographic puzzle cancellation service for deterring bulk...
Cryptographic security method and electronic devices...
Cryptographic technique that provides fast encryption and...
Cryptographic techniques for a communications network
Cryptography-based low distortion robust data authentication...
Cryptography-based tamper-resistant software design mechanism
Cryptosystem based on a Jacobian of a curve
Cryptosystem based on a Jacobian of a curve
Cryptosystems with elliptic curves chosen by users
Customizable instant messaging private tags
Customizable instant messaging private tags
Data alteration checking apparatus and method and recording...
Data alteration checking apparatus and method and recording...
Data application method
Data authentication system
Data authentication system
Data card verification system
Data card verification system
Data card verification system