| 10917394 |
Data operations using a proxy encryption key |
Mitica Manu, Baskar Sridharan, Raghunath Ramakrishnan, Sriram K. Rajamani, Pushkar Vijay Chitnis +2 more |
2021-02-09 |
| 10904231 |
Encryption using multi-level encryption key derivation |
Baskar Sridharan, Sriram K. Rajamani, Mitica Manu |
2021-01-26 |
| 10484352 |
Data operations using a proxy encryption key |
Mitica Manu, Baskar Sridharan, Raghunath Ramakrishnan, Sriram K. Rajamani, Pushkar Vijay Chitnis +2 more |
2019-11-19 |
| 7975149 |
Software protection using data structures |
Ramarathnam Venkatesan |
2011-07-05 |
| 7617397 |
Systems and methods for generation and validation of isogeny-based signatures |
David Jao, Peter L. Montgomery, Ramarathnam Venkatesan |
2009-11-10 |
| 7587605 |
Cryptographic pairing-based short signature generation and verification |
Ramarathnam Venkatesan, Dan Boneh, Peter L. Montgomery |
2009-09-08 |
| 7047408 |
Secure mutual network authentication and key exchange protocol |
Eric Grosse, Philip Mackenzie, Sarvar Patel |
2006-05-16 |
| 6091819 |
Accelerating public-key cryptography by precomputing randomly generated pairs |
Ramarathnam Venkatesan |
2000-07-18 |