This page displays all 「FI」 in main group G09C1/00. |
HB:Handbook | ||||
CC:Concordance |
|
Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system (cryptographic typewriters G09C 3/00) | HB | CC | 5J104 | |
|
.Encrypting programs | HB | CC | 5J104 | |
|
.Common key encryptosystems | HB | CC | 5J104 | |
|
Block encryption | HB | CC | 5J104 | |
|
.DES (Data Encryption Standard) | HB | CC | 5J104 | |
|
.FEAL (Fast data Encipherment Algorithm) | HB | CC | 5J104 | |
|
Stream encryption | HB | CC | 5J104 | |
|
Others | HB | CC | 5J104 | |
|
.Public key encryptosystem | HB | CC | 5J104 | |
|
Exponentiation ciphers (Rabin, ELGamel, reciprocal ciphers and the equivalent) | HB | CC | 5J104 | |
|
.RSA | HB | CC | 5J104 | |
|
Others (knapsack encryption and the equivalent) | HB | CC | 5J104 | |
|
.Key management | HB | CC | 5J104 | |
|
Secrecy and encrypting of keys | HB | CC | 5J104 | |
|
key generation via distribution and telecommunication paths | HB | CC | 5J104 | |
|
.Distributed types (no need for centre) | HB | CC | 5J104 | |
|
.Distributed administration type (keys being generated and delivered based on the initial information registered at the centre such as ID or the equivalent) | HB | CC | 5J104 | |
|
Regarding common keys (sub-classifications) | HB | CC | 5J104 | |
|
Regarding public keys (sub-classifications) | HB | CC | 5J104 | |
|
Others | HB | CC | 5J104 | |
|
.Authentication and signatures | HB | CC | 5J104 | |
|
By symmetrical systems (both authenticating party and authenticated party having the same information) | HB | CC | 5J104 | |
|
By asymmetrical systems (only authenticating party having confidential information of authenticated party) | HB | CC | 5J104 | |
|
.By zero knowledge verifications | HB | CC | 5J104 | |
|
Message authentication (sub-classification) | HB | CC | 5J104 | |
|
Entity authentication (sub-verification) | HB | CC | 5J104 | |
|
Others | HB | CC | 5J104 | |
|
.Constructions of calculating instruments | HB | CC | 5J104 | |
|
Multiplication residues, power residues | HB | CC | 5J104 | |
|
Generating random numbers | HB | CC | 5J104 | |
|
Others (hash functions, discriminating prime numbers and the like) | HB | CC | 5J104 | |
|
.Particular usage (sub-classification as a general rule) | HB | CC | 5J104 | |
|
IC cards | HB | CC | 5J104 | |
|
Banking | HB | CC | 5J104 | |
|
.Electronics money | HB | CC | 5J104 | |
|
File programs | HB | CC | 5J104 | |
|
Online networks | HB | CC | 5J104 | |
|
Using common key encryption | HB | CC | 5J104 | |
|
Using public key encryption | HB | CC | 5J104 | |
|
Others | HB | CC | 5J104 | |
|
.by using a ciphering code in chart form | HB | CC | 5J104 | |
|
.with sign carriers or indicators moved relative to one another to positions determined by a permutation code or key, so as to indicate the appropriate corresponding clear or ciphered text | HB | CC | 5J104 | |
|
.wherein elements corresponding to the signs making up the clear text are operatively connected with elements corresponding to the signs making up the ciphered text, the connections, during operation of the apparatus, being automatically and continuously permuted by a coding or key member | HB | CC | 5J104 | |
|
..the connections being mechanical | HB | CC | 5J104 | |
|
..the connections being electrical | HB | CC | 5J104 | |
|
...comprising contact-bearing permutation discs | HB | CC | 5J104 | |
|
..involving removable or interchangeable coding numbers, e.g. master tapes, punched cards | HB | CC | 5J104 | |