CN104868998A
|
|
System, Device, And Method Of Provisioning Cryptographic Data To Electronic Devices
|
CN103390124A
|
|
Device, system, and method of secure entry and handling of passwords
|
WO2011058533A2
|
|
Methods circuits devices and systems for provisioning of cryptographic data to one or more electronic devices
|
US2009202078A1
|
|
Device, system, and method of securely executing applications
|
EP2063376A1
|
|
Device, system and method for masking arbitrary boolean functions
|
DE102008034308A1
|
|
Digital rights management facility, system and method using supplemental content
|
US2009016528A1
|
|
Device, system, and method of obfuscating data processed within an integrated circuit
|
DE102008028881A1
|
|
Method and system for checking and authorizing content
|
WO2007004219A2
|
|
System, device and method of verifying that a code is executed by a processor
|
WO2006131921A2
|
|
Method, device, and system of maintaining a context of a secure execution environment
|
WO2006056988A2
|
|
System, method and apparatus of securing an operating system
|
WO2006051522A2
|
|
Method, device, and system of securely storing data
|
WO2006046240A2
|
|
System, method and device of generating a random value
|
WO2005124578A2
|
|
System, method and apparatus of error detection during a modular operation
|
IL166684D0
|
|
Method and device of manipulating data in finite fields
|
EP1595357A2
|
|
Device and method of manipulating masked data
|
WO2004014016A1
|
|
Method and device of manipulating data in finite fields
|
IL154010D0
|
|
Flexible hardware implementation of hash functions
|
WO03023601A2
|
|
Method and apparatus for efficient computation of modular exponent
|
IL143951D0
|
|
A method and apparatus for carrying out efficiently arithmetic computations in hardware
|