| 12418397 |
Cryptographic method, systems and services for evaluating univariate or multivariate real-valued functions on encrypted data |
Marc Joye |
2025-09-16 |
| 12177330 |
Computational network conversion for fully homomorphic evaluation |
Benoit Chevallier-Mames |
2024-12-24 |
| 9749129 |
Method and system for conditional access to a digital content, associated terminal and subscriber device |
Cécile Delerablee, Aline Gouget |
2017-08-29 |
| 9596080 |
Method of generating prime numbers proven suitable for chip cards |
Benoit Feix, Christophe Clavier, Loïc Thierry |
2017-03-14 |
| 9577826 |
Method of generating proven prime numbers suitable for being implemented in a smart card |
Benoit Feix, Christophe Clavier, Loïc Thierry |
2017-02-21 |
| 9454755 |
Transaction method between two entities providing anonymity revocation for tree-based schemes without trusted party |
Aline Gouget |
2016-09-27 |
| 9294273 |
Method and system for conditional access to a digital content, associated terminal and subscriber device |
Cécile Delerablee, Aline Gouget |
2016-03-22 |
| 9178695 |
Method for identifying a device used by a hacked terminal, and related device |
Cécile Delerablee, Aline Gouget |
2015-11-03 |
| 9130739 |
Method and apparatus for nonlinear IV setup in keystream generators |
Aline Gouget |
2015-09-08 |
| 8656163 |
Method for establishing a secured communication without preliminary information share |
Karine Villegas, Aline Gouget, Louis Goubin |
2014-02-18 |
| 8644509 |
Data providing process based on an IBPE scheme |
Aline Gouget |
2014-02-04 |
| 8229112 |
Decipherable searchable encryption method, system for such an encryption |
Thomas Fuhr |
2012-07-24 |
| 7860911 |
Extended precision accumulator |
Morten Stribaek |
2010-12-28 |
| 7711763 |
Microprocessor instructions for performing polynomial arithmetic operations |
Morten Stribaek, Kevin D. Kissell |
2010-05-04 |
| 7424114 |
Method for enhancing security of public key encryption schemas |
Marc Joye, Jean-Sebastien Coron |
2008-09-09 |
| 7386123 |
Method of implementing in an electronic component a cryptographic algorithm for finding the public exponent |
Marc Joye, Florence Ques-Rochat, Karine Villegas, Nathalie Feyt, Benoit Chevallier Mames |
2008-06-10 |
| 7225212 |
Extended precision accumulator |
Morten Stribaek |
2007-05-29 |
| 7181484 |
Extended-precision accumulation of multiplier output |
Morten Stribaek |
2007-02-20 |
| 7149763 |
Method for generating a random prime number within a predetermined interval |
Marc Joye |
2006-12-12 |
| 7123717 |
Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm |
Jean-Sebastien Coron |
2006-10-17 |
| 7113595 |
Generation of a random number that is non-divisible by a set of prime numbers |
Marc Joye |
2006-09-26 |
| 7054444 |
Public and private key cryptographic method |
— |
2006-05-30 |