Industry
-
CPC
-
H04L9/00
This industry / category may be too specific. Please go to a parent level for more data
Sub Industries
H04L9/001using chaotic signals
H04L9/002Countermeasures against attacks on cryptographic mechanisms
H04L9/003for power analysis
H04L9/004for fault attacks
H04L9/005for timing attacks
H04L9/006involving public key infrastructure [PKI] trust models
H04L9/007involving hierarchical structures
H04L9/008involving homomorphic encryption
H04L9/06the encryption apparatus using shift registers or memories for block-wise or stream coding
H04L9/0606including means for manipulating block length
H04L9/0612Countermeasures against differential power analysis
H04L9/0618Block ciphers
H04L9/0625with splitting of the data block into left and right halves
H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations
H04L9/0637Modes of operation
H04L9/0643Hash functions
H04L9/065Encryption by serially and continuously modifying data stream elements
H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence
H04L9/0662with particular pseudorandom sequence generator
H04L9/0668producing a non-linear pseudorandom sequence
H04L9/0675including means for processing multiple rounds
H04L9/0681specifically for Rijndael
H04L9/0687with splitting of the data block into left and right halves
H04L9/0693including variable substitution, permutation, order or number of rounds, controlled by a key and/or the input data
H04L9/08Key distribution or management
H04L9/0802using a key distribution center, a trusted party or a key server
H04L9/0805involving a conference key or a group key
H04L9/0808using a control vector
H04L9/0811using Diffie-Hellman key agreement
H04L9/0813with user authentication or key authentication
H04L9/0816Key establishment
H04L9/0819Key transport or distribution
H04L9/0822using key encryption key
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]
H04L9/0827involving distinctive intermediate devices or communication paths
H04L9/083involving central third party
H04L9/0833involving conference or group key
H04L9/0836using tree structure or hierarchical structure
H04L9/0838Key agreement
H04L9/0841involving Diffie-Hellman or related key agreement protocols
H04L9/0844with user authentication or key authentication
H04L9/0847involving identity based encryption [IBE] schemes
H04L9/085Secret sharing or secret splitting
H04L9/0852Quantum cryptography "
H04L9/0855involving additional nodes
H04L9/0858Details about key distillation or coding
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
H04L9/0863involving passwords or one-time passwords
H04L9/0866involving user or device identifiers
H04L9/0869involving random numbers or seeds
H04L9/0872using geo-location information
H04L9/0875based on channel impulse response [CIR]
H04L9/0877using additional device
H04L9/088Usage controlling of secret information
H04L9/0883using quantum cryptography
H04L9/0886using key recovery or key escrow
H04L9/0888using secret sharing
H04L9/0891Revocation or update of secret information
H04L9/0894Escrow, recovery or storing of secret information
H04L9/0897involving additional devices
H04L9/10with particular housing, physical features or manual controls
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
H04L9/14using a plurality of keys or algorithms
H04L9/16the keys or algorithms being changed during operation
H04L9/18Encryption by serially and continuously modifying data stream elements
H04L9/20Pseudorandom key sequence combined element-for-element with data sequence
H04L9/22with particular pseudorandom sequence generator
H04L9/24sequence produced by more than one generator
H04L9/26producing a non-linear pseudorandom sequence
H04L9/28using particular encryption algorithm
H04L9/30Public key
H04L9/3006underlying computational problems or public-key parameters
H04L9/3013involving the discrete logarithm problem
H04L9/302involving the integer factorization problem
H04L9/3026details relating to polynomials generation
H04L9/3033details relating to pseudo-prime or prime number generation
H04L9/304based on error correction codes
H04L9/3046based on factoring a large integer
H04L9/3053based on a modular knapsack
H04L9/306based on discrete logarithm
H04L9/3066involving algebraic varieties
H04L9/3073involving pairings
H04L9/308based on polynomial equations
H04L9/3086based on probabilistic schemes
H04L9/3093involving Lattices or polynomial equations
H04L9/32including means for verifying the identity or authority of a user of the system or for message authentication
H04L9/3202involving a third party or a trusted authority
H04L9/3205using a non-public key algorithm
H04L9/3207using zero-knowledge proof
H04L9/321involving a third party or a trusted authority
H04L9/3213using tickets or tokens
H04L9/3215using a plurality of channels
H04L9/3218using proof of knowledge
H04L9/3221interactive zero-knowledge proofs
H04L9/3223using hash functions
H04L9/3226using a predetermined code
H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization
H04L9/3231Biological data
H04L9/3234involving additional secure or trusted devices
H04L9/3236using cryptographic hash functions
H04L9/3239involving non-keyed hash functions
H04L9/3242involving keyed hash functions
H04L9/3244for message authentication
H04L9/3247involving digital signatures
H04L9/3249using RSA or related signature schemes
H04L9/3252using DSA or related signature schemes
H04L9/3255using group based signatures
H04L9/3257using blind signatures
H04L9/326involving the concurrent use of a plurality of channels of different nature
H04L9/3263involving certificates
H04L9/3265using certificate chains, trees or paths; Hierarchical trust model
H04L9/3268using certificate validation, registration, distribution or revocation
H04L9/3271using challenge-response
H04L9/3273for mutual authentication
H04L9/3276involving splitting up or repeating the challenge and/or response
H04L9/3278using physically unclonable functions [PUF]
H04L9/3281using electronic signatures
H04L9/3284using blind signatures
H04L9/3286involving a plurality or a group of signers
H04L9/3289with message recovery
H04L9/3292with partial message recovery
H04L9/3294using time stamps or public key certificates
H04L9/3297involving time stamps
H04L9/34Bits, or blocks of bits, of the telegraphic message being interchanged in time
H04L9/36with means for detecting characters not meant for transmission
H04L9/38Encryption being effected by mechanical apparatus