Generation of keys of variable length from cryptographic tables
BF Cambou - US Patent 10,979,221, 2021 - Google Patents
(57) ABSTRACT A cryptographic infrastructure, which provides a method for generating
private keys of variable length from a crypto graphic table and a public key. This …
private keys of variable length from a crypto graphic table and a public key. This …
Methods and systems for data protection
R Kuang - US Patent 10,476,664, 2019 - Google Patents
A communication system, comprising a first apparatus and a second apparatus. A
processing entity of the first apparatus is configured for: obtaining a first bit stream; …
processing entity of the first apparatus is configured for: obtaining a first bit stream; …
Methods and systems for secure data communication
R Kuang - US Patent 11,323,247, 2022 - Google Patents
A computer-implemented method, which comprises: receiving an input message comprising
N-bit input segments, N being an integer greater than one; converting the N-bit input …
N-bit input segments, N being an integer greater than one; converting the N-bit input …
Equivocation augmentation dynamic secrecy system
HSP Figueira - US Patent 11,233,628, 2022 - Google Patents
Shannon's equivocation, the conditional entropy of key or message with respect to a specific
ciphertext, is the primary indicator of the security of any secrecy system, in that when key …
ciphertext, is the primary indicator of the security of any secrecy system, in that when key …
Authentication of a subscribed code table user utilizing optimized code table signaling
B Conway - US Patent 10,523,490, 2019 - Google Patents
In various embodiments, a computer-implemented method enabling and maintaining
authentication of a sender-receiver pair for a communication system by applying changes to …
authentication of a sender-receiver pair for a communication system by applying changes to …
Systems and methods for post-quantum cryptography optimization
P Arbajian, ME Meinholz, AJ Garner IV - US Patent 11,449,799, 2022 - Google Patents
Abstract Systems, apparatuses, methods, and computer program products are disclosed for
post-quantum cryptography (PQC). An example method includes receiving data. The …
post-quantum cryptography (PQC). An example method includes receiving data. The …
Systems and methods for post-quantum cryptography optimization
R Ramanathan, A Rao, A Sanders… - US Patent …, 2024 - Google Patents
Abstract Systems, apparatuses, methods, and computer program products are disclosed for
gathering performance information for post-quantum cryptography (PQC) is provided. An …
gathering performance information for post-quantum cryptography (PQC) is provided. An …
Systems and methods for post-quantum cryptography optimization
P Arbajian, A Sanders, AJ Garner IV… - US Patent …, 2022 - Google Patents
Abstract Systems, apparatuses, methods, and computer program products are disclosed for
post-quantum cryptography (PQC). An example method includes receiving data, a set of …
post-quantum cryptography (PQC). An example method includes receiving data, a set of …
Systems and methods for post-quantum cryptography optimization
RL Carter Jr, RK Maganti, ME Meinholz… - US Patent …, 2022 - Google Patents
Abstract Systems, apparatuses, methods, and computer program products are disclosed for
post-quantum cryptography (PQC). An example method includes receiving data. The …
post-quantum cryptography (PQC). An example method includes receiving data. The …
Systems and methods for post-quantum cryptography optimization
RK Maganti, ME Meinholz, JJ Stapleton… - US Patent …, 2022 - Google Patents
2019-10-16 Assigned to WELLS FARGO BANK, NA reassignment WELLS FARGO BANK,
NA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS) …
NA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS) …