Cryptographic Method for Securely Implementing an Exponentiation, and an Associated Component

Number of patents in Portfolio can not be more than 2000

United States of America Patent

APP PUB NO 20090122980A1
SERIAL NO

11988750

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

mod B, A and B being respectively the exponent and the modular exponentiation EM. The private operation includes the following steps: calculating an intermediate module B*, an intermediate message M* and an intermediate exponent A*, based on B, M and/or A; the intermediate module B* being deterministically calculated and the intermediate message M* being randomly calculated; calculating an intermediate modular exponentiation EM*=MA mod B*; and calculating the signed or decrypted message s based on the intermediate modular exponentiation EM*. An electronic component for implementing the cryptographic method is also disclosed.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddress
GEMPLUSPARC D'ACTIVITIES DE GEMENOS AVENUE DU PIC DE BERTAGNE GEMENOS 13420

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Ciet, Mathieu La Ciotat , FR 107 959
Villegas, Karine Gemenos, FR 28 52

Cited Art Landscape

Load Citation

Patent Citation Ranking

Forward Cite Landscape

Load Citation