BRPI0404122A - Uso de isogenias para o desenho de criptossistemas - Google Patents
Uso de isogenias para o desenho de criptossistemasInfo
- Publication number
- BRPI0404122A BRPI0404122A BR0404122-4A BRPI0404122A BRPI0404122A BR PI0404122 A BRPI0404122 A BR PI0404122A BR PI0404122 A BRPI0404122 A BR PI0404122A BR PI0404122 A BRPI0404122 A BR PI0404122A
- Authority
- BR
- Brazil
- Prior art keywords
- isogenies
- presented
- techniques
- solutions
- public key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3257—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Computational Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Dental Preparations (AREA)
- Glass Compositions (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Devices For Checking Fares Or Tickets At Control Points (AREA)
- Developing Agents For Electrophotography (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
- Transition And Organic Metals Composition Catalysts For Addition Polymerization (AREA)
- Complex Calculations (AREA)
Abstract
"USO DE ISOGENIAS PARA O DESENHO DE CRIPTOSSISTEMAS". São apresentadas técnicas para prover sistemas de criptografia de chave pública. Mais particularmente, isogenias de variedades Abelianas (por exemplo, curvas elípticas em casos unidimensionais) são utilizadas de modo a prover sistemas de criptografia de chave pública. Por exemplo, as isogenias permitem o uso de múltiplas curvas ao invés de uma curva única a fim de prover uma criptografia mais segura. As técnicas podem ser aplicadas em assinaturas digitais e/ou em soluções de criptografia baseada em identidade (IBE) . Além disso, as isogenias podem ser usadas em outras aplicações, como, por exemplo, em assinaturas cegas, sistemas hierárquicos, ou coisa do gênero. Adicionalmente, soluções são apresentadas para a geração das isogenias.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US51714203P | 2003-11-03 | 2003-11-03 | |
| US10/816,083 US7499544B2 (en) | 2003-11-03 | 2004-03-31 | Use of isogenies for design of cryptosystems |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| BRPI0404122A true BRPI0404122A (pt) | 2005-06-21 |
Family
ID=34426337
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BR0404122-4A BRPI0404122A (pt) | 2003-11-03 | 2004-09-20 | Uso de isogenias para o desenho de criptossistemas |
Country Status (19)
| Country | Link |
|---|---|
| US (1) | US7499544B2 (pt) |
| EP (1) | EP1528705B1 (pt) |
| JP (1) | JP4809598B2 (pt) |
| KR (1) | KR101098701B1 (pt) |
| CN (1) | CN100583755C (pt) |
| AT (1) | ATE429098T1 (pt) |
| AU (1) | AU2004218638B2 (pt) |
| BR (1) | BRPI0404122A (pt) |
| CA (1) | CA2483486C (pt) |
| CO (1) | CO5630049A1 (pt) |
| DE (1) | DE602004020565D1 (pt) |
| IL (1) | IL164071A0 (pt) |
| MX (1) | MXPA04010155A (pt) |
| MY (1) | MY165770A (pt) |
| NO (1) | NO20044028L (pt) |
| NZ (1) | NZ535698A (pt) |
| RU (1) | RU2376651C2 (pt) |
| SG (1) | SG111191A1 (pt) |
| TW (1) | TWI360990B (pt) |
Families Citing this family (73)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2006050605A1 (en) * | 2004-11-11 | 2006-05-18 | Certicom Corp. | New trapdoor one-way function on elliptic curves and their applications to shorter signatures and asymmetric encryption |
| US7594261B2 (en) * | 2005-02-08 | 2009-09-22 | Microsoft Corporation | Cryptographic applications of the Cartier pairing |
| US7680268B2 (en) | 2005-03-15 | 2010-03-16 | Microsoft Corporation | Elliptic curve point octupling using single instruction multiple data processing |
| US7702098B2 (en) | 2005-03-15 | 2010-04-20 | Microsoft Corporation | Elliptic curve point octupling for weighted projective coordinates |
| US7617397B2 (en) * | 2005-04-29 | 2009-11-10 | Microsoft Corporation | Systems and methods for generation and validation of isogeny-based signatures |
| JP4575251B2 (ja) * | 2005-07-25 | 2010-11-04 | 株式会社東芝 | デジタル署名生成装置、デジタル署名検証装置、デジタル署名生成方法、デジタル署名検証方法、デジタル署名生成プログラム及びデジタル署名検証プログラム |
| CN1980123B (zh) * | 2005-11-30 | 2010-07-21 | 中国科学院研究生院 | 基于ibe的pki系统的实现方法及其密钥管理装置 |
| US8180047B2 (en) * | 2006-01-13 | 2012-05-15 | Microsoft Corporation | Trapdoor pairings |
| JPWO2008156107A1 (ja) | 2007-06-18 | 2010-08-26 | 日本電気株式会社 | 電子データの暗号化及び暗号化データ復号化システム及びその方法 |
| KR101490687B1 (ko) * | 2007-08-20 | 2015-02-06 | 삼성전자주식회사 | 홈 네트워크에서 디바이스들이 비밀 정보를 공유하는 방법및 이를 위한 장치 |
| CN101925942B (zh) * | 2008-02-20 | 2013-11-27 | 三菱电机株式会社 | 验证装置 |
| US8037327B2 (en) * | 2008-03-31 | 2011-10-11 | Agilent Technologies, Inc. | System and method for improving dynamic response in a power supply |
| US8625777B2 (en) * | 2008-08-29 | 2014-01-07 | National University Corporation Okayama University | Pairing computation device, pairing computation method, and pairing computation program |
| US8250367B2 (en) * | 2008-09-30 | 2012-08-21 | Microsoft Corporation | Cryptographic applications of efficiently evaluating large degree isogenies |
| US20100100947A1 (en) * | 2008-10-21 | 2010-04-22 | Apple Inc. | Scheme for authenticating without password exchange |
| JP5268066B2 (ja) * | 2009-01-16 | 2013-08-21 | 日本電信電話株式会社 | 変換演算装置、その方法、プログラム及び記録媒体 |
| US8510558B2 (en) * | 2009-02-17 | 2013-08-13 | Alcatel Lucent | Identity based authenticated key agreement protocol |
| CN101800640B (zh) * | 2009-11-10 | 2012-09-05 | 浙江工业大学 | 基于Web Service的IBE密钥管理系统 |
| US8634563B2 (en) | 2010-12-17 | 2014-01-21 | Microsoft Corporation | Attribute based encryption using lattices |
| JP5693206B2 (ja) * | 2010-12-22 | 2015-04-01 | 三菱電機株式会社 | 暗号処理システム、鍵生成装置、暗号化装置、復号装置、暗号処理方法及び暗号処理プログラム |
| RU2494553C2 (ru) * | 2011-05-03 | 2013-09-27 | ЗАО Институт инфокоммуникационных технологий | Способ защиты информации |
| RU2450457C1 (ru) * | 2011-05-20 | 2012-05-10 | Государственное образовательное учреждение высшего профессионального образования Марийский государственный технический университет | Способ шифрования |
| US9503259B2 (en) * | 2012-02-09 | 2016-11-22 | Irdeto B.V. | System and method for generating and protecting cryptographic keys |
| US10148285B1 (en) | 2012-07-25 | 2018-12-04 | Erich Schmitt | Abstraction and de-abstraction of a digital data stream |
| CN104348614B (zh) * | 2013-07-24 | 2019-02-01 | 腾讯科技(深圳)有限公司 | 身份合法性验证的方法、装置及服务器 |
| RU2541938C1 (ru) * | 2013-11-20 | 2015-02-20 | федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский государственный политехнический университет" (ФГАОУ ВО "СПбПУ") | Способ шифрования с защитой от квантовых атак на основе циклов функций вебера |
| US10795858B1 (en) | 2014-02-18 | 2020-10-06 | Erich Schmitt | Universal abstraction and de-abstraction of a digital data stream |
| US20240356727A1 (en) * | 2015-06-28 | 2024-10-24 | Peter Lablans | Method and Apparatus for Activating a Remote Device |
| US12425189B1 (en) * | 2015-12-20 | 2025-09-23 | Peter Lablans | Cryptographic computer machines with novel switching devices |
| US12143468B2 (en) * | 2015-12-20 | 2024-11-12 | Lcip Jv | Cryptographic computer machines with novel switching devices |
| JP6614979B2 (ja) * | 2016-01-15 | 2019-12-04 | 三菱電機株式会社 | 暗号装置、暗号方法及び暗号プログラム |
| WO2017145018A1 (en) | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | A method and system for the secure transfer of entities on a blockchain |
| CN109074579B (zh) | 2016-02-23 | 2022-10-11 | 区块链控股有限公司 | 使用分布式散列表和区块链保护计算机软件的方法及系统 |
| KR102799781B1 (ko) | 2016-02-23 | 2025-04-23 | 엔체인 홀딩스 리미티드 | 안전한 정보 교환과 계층 구조적이고 결정론적인 암호키를 위한 공통 비밀 결정 |
| BR112018016825A2 (pt) | 2016-02-23 | 2018-12-26 | Nchain Holdings Ltd | métodos para transferir, criar e resgatar um primeiro token associado ou não a um ativo digital, criar um terceiro token, programa de computador e dispositivo |
| SG11201806704TA (en) | 2016-02-23 | 2018-09-27 | Nchain Holdings Ltd | Blockchain-based exchange with tokenisation |
| WO2017145047A1 (en) | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | Blockchain-implemented method for control and distribution of digital content |
| JP6833861B2 (ja) | 2016-02-23 | 2021-02-24 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | ブロックチェーンシステム内におけるフィードバックを統合したエージェントベースチューリング完全なトランザクション |
| GB2562623A (en) | 2016-02-23 | 2018-11-21 | Nchain Holdings Ltd | Registry and automated management method for blockchain-enforced smart contracts |
| JP6995762B2 (ja) | 2016-02-23 | 2022-01-17 | エヌチェーン ホールディングス リミテッド | ブロックチェーンからのデータのセキュアな抽出のための暗号方法及びシステム |
| SG11201805542TA (en) | 2016-02-23 | 2018-09-27 | Nchain Holdings Ltd | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
| MX2018010054A (es) | 2016-02-23 | 2019-01-21 | Nchain Holdings Ltd | Metodo y sistema de tokenizacion para la implementacion de cambios de moneda en una cadena de bloques. |
| AU2017222421B2 (en) | 2016-02-23 | 2022-09-01 | nChain Holdings Limited | Personal device security using elliptic curve cryptography for secret sharing |
| CN109155035B (zh) | 2016-02-23 | 2023-07-04 | 区块链控股有限公司 | 用于使用区块链在点对点分布式账簿上有效转移实体的方法及系统 |
| JP7083754B2 (ja) | 2016-02-23 | 2022-06-13 | エヌチェーン ホールディングス リミテッド | スマートコントラクトに基づく自動給与支払方法及びシステムをもたらす、ブロックチェーン上の給与支払に関連付けられた暗号通貨の効率的な転送のための方法及びシステム |
| CN116934328A (zh) | 2016-02-23 | 2023-10-24 | 区块链控股有限公司 | 用于经由区块链控制资产有关的动作的系统及方法 |
| CN105915520B (zh) * | 2016-04-18 | 2019-02-12 | 深圳大学 | 基于公钥可搜索加密的文件存储、搜索方法及存储系统 |
| JP2017212699A (ja) * | 2016-05-27 | 2017-11-30 | 三菱電機株式会社 | 暗号化装置、復号装置及び暗号システム |
| CA2984390A1 (en) * | 2016-11-07 | 2018-05-07 | Infosec Global Inc. | Elliptic curve isogeny-based cryptographic scheme |
| EP3367608A1 (en) * | 2017-02-28 | 2018-08-29 | Koninklijke Philips N.V. | Elliptic curve isogeny based key agreement protocol |
| EP3379766B1 (en) * | 2017-03-20 | 2019-06-26 | Huawei Technologies Co., Ltd. | A wireless communication device for communication in a wireless communication network |
| US11146397B2 (en) * | 2017-10-31 | 2021-10-12 | Micro Focus Llc | Encoding abelian variety-based ciphertext with metadata |
| CN108536651B (zh) * | 2018-04-19 | 2022-04-05 | 武汉轻工大学 | 生成可逆模m矩阵的方法和装置 |
| WO2019208484A1 (ja) * | 2018-04-25 | 2019-10-31 | 日本電信電話株式会社 | 秘密集約総和システム、秘密計算装置、秘密集約総和方法、およびプログラム |
| WO2020071187A1 (ja) * | 2018-10-04 | 2020-04-09 | 日本電信電話株式会社 | 秘密シグモイド関数計算システム、秘密ロジスティック回帰計算システム、秘密シグモイド関数計算装置、秘密ロジスティック回帰計算装置、秘密シグモイド関数計算方法、秘密ロジスティック回帰計算方法、プログラム |
| KR102184189B1 (ko) * | 2018-11-19 | 2020-11-27 | 주식회사 엔에스에이치씨 | 꼬인 에드워즈 곡선에 대한 4차 아이소제니 계산 방법 |
| KR102184188B1 (ko) * | 2018-11-19 | 2020-11-27 | 주식회사 엔에스에이치씨 | 꼬인 에드워즈 곡선에 대한 3차 아이소제니 계산 방법 |
| US11764940B2 (en) | 2019-01-10 | 2023-09-19 | Duality Technologies, Inc. | Secure search of secret data in a semi-trusted environment using homomorphic encryption |
| US11032074B2 (en) * | 2019-02-11 | 2021-06-08 | Pqsecure Technologies, Llc | Cryptosystem and method using isogeny-based computations to reduce a memory footprint |
| KR20220012851A (ko) | 2019-05-30 | 2022-02-04 | 김봉만 | 대칭 키 암호화/교환을 위한 양자 내성 암호화 및 진보된 암호화 및 키 교환(aeke) 방법 |
| US10880278B1 (en) * | 2019-10-03 | 2020-12-29 | ISARA Corporation | Broadcasting in supersingular isogeny-based cryptosystems |
| US11509473B2 (en) | 2020-07-20 | 2022-11-22 | Pqsecure Technologies, Llc | Architecture and method for hybrid isogeny-based cryptosystems |
| CN116194977B (zh) * | 2020-09-23 | 2026-03-17 | 三菱电机株式会社 | 密码系统、加密装置、解密装置和密钥生成装置 |
| WO2022250656A1 (en) * | 2021-05-25 | 2022-12-01 | Pqsecure Technologies, Llc | An efficient and scalable architecture and method for isogeny-based cryptosystems |
| CN113254985B (zh) * | 2021-07-15 | 2021-12-21 | 北京信安世纪科技股份有限公司 | 数据加密方法、数据处理方法、数据解密方法及电子设备 |
| US11483151B1 (en) * | 2021-07-16 | 2022-10-25 | Pqsecure Technologies, Llc | Method and system for computing large-degree isogenies with an odd degree |
| WO2023055582A1 (en) * | 2021-09-30 | 2023-04-06 | Visa International Service Association | Round optimal oblivious transfers from isogenies |
| JP7771003B2 (ja) * | 2022-07-01 | 2025-11-17 | 株式会社東芝 | 同種写像計算装置、同種写像計算方法及びプログラム |
| EP4311161A1 (en) * | 2022-07-18 | 2024-01-24 | GMV Soluciones Globales Internet, S.A.U. | Method and entity for generating a private key in an identity-based cryptosystem without key escrow |
| WO2024224646A1 (ja) * | 2023-04-28 | 2024-10-31 | 日本電信電話株式会社 | 電子署名システム、電子署名方法及びプログラム |
| US20250158803A1 (en) * | 2023-11-11 | 2025-05-15 | Peter Lablans | Encryption Cloaking with a Modified Radix-n Function for Enhanced Security |
| US12476789B1 (en) * | 2024-04-02 | 2025-11-18 | Peter Lablans | Computational function transformation (CFT) in computer implemented cryptography |
| CN121418108B (zh) * | 2025-12-23 | 2026-03-06 | 合肥国家实验室 | 基于同源的签名方法、装置、设备、介质 |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0233239A (ja) * | 1988-07-23 | 1990-02-02 | Nintendo Co Ltd | 通信制御装置 |
| US5497423A (en) | 1993-06-18 | 1996-03-05 | Matsushita Electric Industrial Co., Ltd. | Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication |
| CA2280906C (en) * | 1997-02-07 | 2010-09-21 | Salbu Research And Development (Proprietary) Limited | Secure packet radio network |
| CN1280726A (zh) | 1997-12-05 | 2001-01-17 | 保密信息技术公司 | 优化椭圆曲线密码计算的变换方法 |
| US5982892A (en) * | 1997-12-22 | 1999-11-09 | Hicks; Christian Bielefeldt | System and method for remote authorization for unlocking electronic data |
| CN1235446A (zh) | 1998-03-05 | 1999-11-17 | 松下电器产业株式会社 | 椭圆曲线变换装置、利用装置和利用系统 |
| AU6243899A (en) | 1998-09-08 | 2000-03-27 | Citibank, N.A. | Elliptic curve cryptosystems for low memory devices |
| EP1215642A4 (en) | 1999-09-08 | 2004-05-26 | Hitachi Ltd | METHOD AND ARRANGEMENT FOR THE GENERATION OF ELLIPTIC CURVES, ELLIPTIC ENCRYPTION SYSTEM, AND RECORDING MEDIUM |
| DE60236094D1 (de) * | 2001-08-13 | 2010-06-02 | Univ R | Systeme und Verfahren zur Verschlüsselung auf Identitätsbasis und damit zusammenhängende kryptografische Techniken |
| US7209555B2 (en) * | 2001-10-25 | 2007-04-24 | Matsushita Electric Industrial Co., Ltd. | Elliptic curve converting device, elliptic curve converting method, elliptic curve utilization device and elliptic curve generating device |
| US7215780B2 (en) | 2001-12-31 | 2007-05-08 | Certicom Corp. | Method and apparatus for elliptic curve scalar multiplication |
-
2004
- 2004-03-31 US US10/816,083 patent/US7499544B2/en active Active
- 2004-08-10 AT AT04018957T patent/ATE429098T1/de not_active IP Right Cessation
- 2004-08-10 EP EP04018957A patent/EP1528705B1/en not_active Expired - Lifetime
- 2004-08-10 SG SG200404557A patent/SG111191A1/en unknown
- 2004-08-10 DE DE602004020565T patent/DE602004020565D1/de not_active Expired - Lifetime
- 2004-08-27 CN CN200410068590A patent/CN100583755C/zh not_active Expired - Lifetime
- 2004-09-10 TW TW093127553A patent/TWI360990B/zh not_active IP Right Cessation
- 2004-09-13 KR KR1020040073118A patent/KR101098701B1/ko not_active Expired - Fee Related
- 2004-09-14 IL IL16407104A patent/IL164071A0/xx unknown
- 2004-09-20 BR BR0404122-4A patent/BRPI0404122A/pt not_active IP Right Cessation
- 2004-09-23 CO CO04094973A patent/CO5630049A1/es not_active Application Discontinuation
- 2004-09-24 NO NO20044028A patent/NO20044028L/no unknown
- 2004-10-01 MY MYPI20044024A patent/MY165770A/en unknown
- 2004-10-01 JP JP2004290612A patent/JP4809598B2/ja not_active Expired - Fee Related
- 2004-10-01 NZ NZ535698A patent/NZ535698A/en not_active IP Right Cessation
- 2004-10-01 CA CA2483486A patent/CA2483486C/en not_active Expired - Fee Related
- 2004-10-06 AU AU2004218638A patent/AU2004218638B2/en not_active Ceased
- 2004-10-15 MX MXPA04010155A patent/MXPA04010155A/es active IP Right Grant
- 2004-11-02 RU RU2004132057/09A patent/RU2376651C2/ru not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| CN100583755C (zh) | 2010-01-20 |
| RU2376651C2 (ru) | 2009-12-20 |
| TWI360990B (en) | 2012-03-21 |
| IL164071A0 (en) | 2005-12-18 |
| TW200525979A (en) | 2005-08-01 |
| JP4809598B2 (ja) | 2011-11-09 |
| US20050094806A1 (en) | 2005-05-05 |
| AU2004218638A1 (en) | 2005-05-19 |
| CO5630049A1 (es) | 2006-04-28 |
| RU2004132057A (ru) | 2006-04-10 |
| NZ535698A (en) | 2006-02-24 |
| AU2004218638B2 (en) | 2009-07-30 |
| EP1528705B1 (en) | 2009-04-15 |
| KR101098701B1 (ko) | 2011-12-23 |
| KR20050042441A (ko) | 2005-05-09 |
| US7499544B2 (en) | 2009-03-03 |
| CA2483486A1 (en) | 2005-05-03 |
| DE602004020565D1 (de) | 2009-05-28 |
| HK1085585A1 (en) | 2006-08-25 |
| ATE429098T1 (de) | 2009-05-15 |
| CN1614922A (zh) | 2005-05-11 |
| MY165770A (en) | 2018-04-23 |
| EP1528705A1 (en) | 2005-05-04 |
| SG111191A1 (en) | 2005-05-30 |
| CA2483486C (en) | 2013-12-24 |
| MXPA04010155A (es) | 2005-05-17 |
| JP2005141200A (ja) | 2005-06-02 |
| NO20044028L (no) | 2005-05-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| BRPI0404122A (pt) | Uso de isogenias para o desenho de criptossistemas | |
| Batina et al. | Hardware architectures for public key cryptography | |
| Vanstone | Next generation security for wireless: elliptic curve cryptography | |
| Scott | Computing the Tate pairing | |
| Jirwan et al. | Review and analysis of cryptography techniques | |
| Kumar et al. | Encryption of data using elliptic curve over finite fields | |
| ATE523017T1 (de) | Schlüsselvereinbarungs- und transportprotokoll | |
| ATE418099T1 (de) | Gesicherte moduläre potenzierung mit leckminimierung für chipkarten und andere kryptosysteme | |
| Swami et al. | Dual modulus RSA based on Jordan-totient function | |
| WO2004064011A3 (en) | Method of constructing hyperelliptic curves suitable for cryptographic purposes and cryptographic apparatus using such a method | |
| Udin et al. | Application of message embedding technique in ElGamal elliptic curve cryptosystem | |
| Chen et al. | A Public-Key Cryptosystem Scheme on Conic Curves Over Z n | |
| Ch et al. | Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem | |
| Blackburn et al. | Group theory in cryptography | |
| Chauhan | An implemented of hybrid cryptography using elliptic curve cryptosystem (ECC) and MD5 | |
| Li et al. | New classes of generalized boolean bent functions over Z 4 | |
| Prabu et al. | A comparative analysis of signature schemes in a new approach of variant on ECDSA | |
| Lin et al. | Digital multisignature on the generalized conic curve over Zn | |
| Bhirud et al. | Data Security Using Elliptic Curve Cryptography | |
| Sahana et al. | A new short signature scheme from Weil pairing | |
| Dhamodharan et al. | Multifarious mapping schemes on Elliptic curve cryptography for IoT security | |
| Shin et al. | A new design of the hash functions with all-or-nothing property | |
| Kaur | A Comparative Analysis of ECDSA VS. RSA Algorithm | |
| SERRAJ | Generating elliptic curves for cryptography | |
| Chen et al. | An efficient undeniable group-oriented signature scheme |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B08F | Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 9A ANUIDADE. |
|
| B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 2259 DE 22/04/2014. |