Issued Patents All Time
Showing 1–22 of 22 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12418397 | Cryptographic method, systems and services for evaluating univariate or multivariate real-valued functions on encrypted data | Marc Joye | 2025-09-16 |
| 12177330 | Computational network conversion for fully homomorphic evaluation | Benoit Chevallier-Mames | 2024-12-24 |
| 9749129 | Method and system for conditional access to a digital content, associated terminal and subscriber device | Cécile Delerablee, Aline Gouget | 2017-08-29 |
| 9596080 | Method of generating prime numbers proven suitable for chip cards | Benoit Feix, Christophe Clavier, Loïc Thierry | 2017-03-14 |
| 9577826 | Method of generating proven prime numbers suitable for being implemented in a smart card | Benoit Feix, Christophe Clavier, Loïc Thierry | 2017-02-21 |
| 9454755 | Transaction method between two entities providing anonymity revocation for tree-based schemes without trusted party | Aline Gouget | 2016-09-27 |
| 9294273 | Method and system for conditional access to a digital content, associated terminal and subscriber device | Cécile Delerablee, Aline Gouget | 2016-03-22 |
| 9178695 | Method for identifying a device used by a hacked terminal, and related device | Cécile Delerablee, Aline Gouget | 2015-11-03 |
| 9130739 | Method and apparatus for nonlinear IV setup in keystream generators | Aline Gouget | 2015-09-08 |
| 8656163 | Method for establishing a secured communication without preliminary information share | Karine Villegas, Aline Gouget, Louis Goubin | 2014-02-18 |
| 8644509 | Data providing process based on an IBPE scheme | Aline Gouget | 2014-02-04 |
| 8229112 | Decipherable searchable encryption method, system for such an encryption | Thomas Fuhr | 2012-07-24 |
| 7860911 | Extended precision accumulator | Morten Stribaek | 2010-12-28 |
| 7711763 | Microprocessor instructions for performing polynomial arithmetic operations | Morten Stribaek, Kevin D. Kissell | 2010-05-04 |
| 7424114 | Method for enhancing security of public key encryption schemas | Marc Joye, Jean-Sebastien Coron | 2008-09-09 |
| 7386123 | Method of implementing in an electronic component a cryptographic algorithm for finding the public exponent | Marc Joye, Florence Ques-Rochat, Karine Villegas, Nathalie Feyt, Benoit Chevallier Mames | 2008-06-10 |
| 7225212 | Extended precision accumulator | Morten Stribaek | 2007-05-29 |
| 7181484 | Extended-precision accumulation of multiplier output | Morten Stribaek | 2007-02-20 |
| 7149763 | Method for generating a random prime number within a predetermined interval | Marc Joye | 2006-12-12 |
| 7123717 | Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm | Jean-Sebastien Coron | 2006-10-17 |
| 7113595 | Generation of a random number that is non-divisible by a set of prime numbers | Marc Joye | 2006-09-26 |
| 7054444 | Public and private key cryptographic method | — | 2006-05-30 |