US2013232507A1
|
|
Data protection for opaque data structures
|
US2014075180A1
|
|
Media storage structures for storing content, devices for using such structures, systems for distributing such structures
|
US2012311338A1
|
|
Secure authentication of identification for computing devices
|
US2013125242A1
|
|
Client-server version control system for software applications
|
US2013124866A1
|
|
Client-server system with security for untrusted server
|
US2013061061A1
|
|
Protecting look up tables by mixing code and operations
|
US2013016836A1
|
|
Cryptographic process execution protecting an input value against attacks
|
US2013067211A1
|
|
Operational mode for block ciphers
|
US2013067212A1
|
|
Securing implementation of cryptographic algorithms using additional rounds
|
US2013014267A1
|
|
Computer protocol generation and obfuscation
|
US2013010963A1
|
|
Multiplicative splits to protect cipher keys
|
US2013003969A1
|
|
Method and apparatus for key distribution with implicit offline authorization
|
US2012254625A1
|
|
Protecting states of a cryptographic process using group automorphisms
|
US2012204038A1
|
|
Performing boolean logic operations using arithmetic operations by code obfuscation
|
US2012204039A1
|
|
Counteracting memory tracing on computing systems by code obfuscation
|
US2012179920A1
|
|
Securing cryptographic process keys using internal structures
|
US2012179919A1
|
|
Securing implementation of a cryptographic process having fixed or dynamic keys
|
US2012159186A1
|
|
Securing the implementation of a cryptographic process using key expansion
|
US2012155638A1
|
|
Securing keys of a cipher using properties of the cipher process
|
US2014101458A1
|
|
Code tampering protection for insecure environments
|