Obscuring cryptographic computations may be accomplished by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the exponent bit pattern, thereby deterring timing attacks.

 
Web www.patentalert.com

< Apparatus using a time division multiple access bus for providing multiple levels of security in a communications system

< Method and system for a recursive security protocol for digital copyright control

> Squared Weil and Tate pairing techniques for use with elliptic curves

> Local authentication of mobile subscribers outside their home systems

~ 00613