Cryptographic hash functions using elliptic polynomial cryptography

Number of patents in Portfolio can not be more than 2000

United States of America Patent

PATENT NO 8165287
APP PUB NO 20100166175A1
SERIAL NO

12318495

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

The cryptographic hash functions using of elliptic polynomial polynomials are based on the elliptic polynomial discrete logarithm problem, which is well known as a computationally hard problem. The hash functions are based on the elliptic polynomial equation in their generation, where different elliptic polynomials are used for different blocks of the same plain text. Particularly, the hash functions use an elliptic polynomial with more than one independent x-coordinate. More specifically, a set of elliptic polynomial points are used that satisfy an elliptic polynomial equation with more than one independent x-coordinate which is defined over a finite field F.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

  • KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Al-Najjar, Atef J Dhahran, SA 4 63
Ghouti, Lahouari Dhahran, SA 31 293
Ibrahim, Mohammad K Leicester, GB 42 547

Cited Art Landscape

Load Citation

Patent Citation Ranking

Forward Cite Landscape

Load Citation