FI (list display)

  • G09C1/00
  • Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system (cryptographic typewriters G09C 3/00) HB CC 5J104
  • G09C1/00,310
  • .Encrypting programs HB CC 5J104
  • G09C1/00,610
  • .Common key encryptosystems HB CC 5J104
  • G09C1/00,610@A
  • Block encryption HB CC 5J104
  • G09C1/00,610@B
  • .DES (Data Encryption Standard) HB CC 5J104
  • G09C1/00,610@C
  • .FEAL (Fast data Encipherment Algorithm) HB CC 5J104
  • G09C1/00,610@D
  • Stream encryption HB CC 5J104
  • G09C1/00,610@Z
  • Others HB CC 5J104
  • G09C1/00,620
  • .Public key encryptosystem HB CC 5J104
  • G09C1/00,620@A
  • Exponentiation ciphers (Rabin, ELGamel, reciprocal ciphers and the equivalent) HB CC 5J104
  • G09C1/00,620@B
  • .RSA HB CC 5J104
  • G09C1/00,620@Z
  • Others (knapsack encryption and the equivalent) HB CC 5J104
  • G09C1/00,630
  • .Key management HB CC 5J104
  • G09C1/00,630@A
  • Secrecy and encrypting of keys HB CC 5J104
  • G09C1/00,630@B
  • key generation via distribution and telecommunication paths HB CC 5J104
  • G09C1/00,630@C
  • .Distributed types (no need for centre) HB CC 5J104
  • G09C1/00,630@D
  • .Distributed administration type (keys being generated and delivered based on the initial information registered at the centre such as ID or the equivalent) HB CC 5J104
  • G09C1/00,630@E
  • Regarding common keys (sub-classifications) HB CC 5J104
  • G09C1/00,630@F
  • Regarding public keys (sub-classifications) HB CC 5J104
  • G09C1/00,630@Z
  • Others HB CC 5J104
  • G09C1/00,640
  • .Authentication and signatures HB CC 5J104
  • G09C1/00,640@A
  • By symmetrical systems (both authenticating party and authenticated party having the same information) HB CC 5J104
  • G09C1/00,640@B
  • By asymmetrical systems (only authenticating party having confidential information of authenticated party) HB CC 5J104
  • G09C1/00,640@C
  • .By zero knowledge verifications HB CC 5J104
  • G09C1/00,640@D
  • Message authentication (sub-classification) HB CC 5J104
  • G09C1/00,640@E
  • Entity authentication (sub-verification) HB CC 5J104
  • G09C1/00,640@Z
  • Others HB CC 5J104
  • G09C1/00,650
  • .Constructions of calculating instruments HB CC 5J104
  • G09C1/00,650@A
  • Multiplication residues, power residues HB CC 5J104
  • G09C1/00,650@B
  • Generating random numbers HB CC 5J104
  • G09C1/00,650@Z
  • Others (hash functions, discriminating prime numbers and the like) HB CC 5J104
  • G09C1/00,660
  • .Particular usage (sub-classification as a general rule) HB CC 5J104
  • G09C1/00,660@A
  • IC cards HB CC 5J104
  • G09C1/00,660@B
  • Banking HB CC 5J104
  • G09C1/00,660@C
  • .Electronics money HB CC 5J104
  • G09C1/00,660@D
  • File programs HB CC 5J104
  • G09C1/00,660@E
  • Online networks HB CC 5J104
  • G09C1/00,660@F
  • Using common key encryption HB CC 5J104
  • G09C1/00,660@G
  • Using public key encryption HB CC 5J104
  • G09C1/00,660@Z
  • Others HB CC 5J104
  • G09C1/02
  • .by using a ciphering code in chart form HB CC 5J104
  • G09C1/04
  • .with sign carriers or indicators moved relative to one another to positions determined by a permutation code or key, so as to indicate the appropriate corresponding clear or ciphered text HB CC 5J104
  • G09C1/06
  • .wherein elements corresponding to the signs making up the clear text are operatively connected with elements corresponding to the signs making up the ciphered text, the connections, during operation of the apparatus, being automatically and continuously permuted by a coding or key member HB CC 5J104
  • G09C1/08
  • ..the connections being mechanical HB CC 5J104
  • G09C1/10
  • ..the connections being electrical HB CC 5J104
  • G09C1/12
  • ...comprising contact-bearing permutation discs HB CC 5J104
  • G09C1/14
  • ..involving removable or interchangeable coding numbers, e.g. master tapes, punched cards HB CC 5J104
    TOP