Paris
France
98
2020-09-24
The entities that hold a legal rights for patent applications filed by inventor Ciet Mathieu:
Mathieu Ciet from Paris, FR has applied for patents for these inventions. The list has both pending applications and granted patents:
Identity document authentication
#2 | 2018-03-29Method for rate-limiting interactions based on dynamically calculated values by supplying problems of varying difficulty to be solved
#3 | 2016-12-08Using state reordering to protect against white box attacks
#4 | 2016-12-08Device activation
#5 | 2016-09-08Computing key-schedules of the AES for use in white boxes
#6 | 2016-07-21Precomputing internal AES states in counter mode to protect keys used in AES computations
#7 | 2016-07-14Media storage structures for storing content, devices for using such structures, systems for distributing such structures
#8 | 2016-04-28Permutation composition based hash function
#9 | 2016-03-17Multi-block cryptographic operation
#10 | 2015-12-17Protecting software through a fake cryptographic layer
#11 | 2015-12-03Protecting cryptographic operations using conjugacy class functions
#12 | 2014-11-27Protecting against white box attacks using column rotation
#13 | 2014-10-09Precomputing internal AES states in counter mode to protect keys used in AES computations
#14 | 2014-07-03Obfuscating Transformations on Data Array Content and Addresses
#15 | 2014-06-12Method and apparatus for dynamic obfuscation of static data
#16 | 2014-06-12Methods and apparatus for correlation protected processing of data operations
#17 | 2014-04-17Data protection using key translation
#18 | 2014-04-10Code tampering protection for insecure environments
#19 | 2014-03-13Media storage structures for storing content, devices for using such structures, systems for distributing such structures
#20 | 2013-12-05Methods and apparatus for data hashing based on non-linear operations
#21 | 2013-10-03Methods and apparatus for correlation protected processing of cryptographic operations
#22 | 2013-09-05Method and apparatus for obfuscating program source codes
#23 | 2013-09-05Systems, methods, and computer-readable media for fertilizing machine-executable code
#24 | 2013-08-08Zero-knowledge based authentication method, system, and apparatus
#25 | 2013-05-30System and method for data obfuscation based on discrete logarithm properties
#26 | 2013-05-02SYSTEM AND METHOD FOR A COLLATZ BASED HASH FUNCTION
#27 | 2013-03-14SECURING IMPLEMENTATION OF CRYPTOGRAPHIC ALGORITHMS USING ADDITIONAL ROUNDS
#28 | 2013-03-14Operational mode for block ciphers
#29 | 2013-03-07Protecting look up tables by mixing code and operations
#30 | 2013-01-17Cryptographic process execution protecting an input value against attacks
#31 | 2013-01-10COMPUTER PROTOCOL GENERATION AND OBFUSCATION
#32 | 2013-01-10Multiplicative splits to protect cipher keys
#33 | 2012-12-06Secure authentication of identification for computing devices
#34 | 2012-10-04Protecting states of a cryptographic process using group automorphisms
#35 | 2012-08-16System and method for revising boolean and arithmetic operations
#36 | 2012-08-09Counteracting memory tracing on computing systems by code obfuscation
#37 | 2012-08-09Performing boolean logic operations using arithmetic operations by code obfuscation
#38 | 2012-08-09Systems and methods for implementing block cipher algorithms on attacker-controlled systems
#39 | 2012-07-12Securing cryptographic process keys using internal structures
#40 | 2012-07-12Securing implementation of a cryptographic process having fixed or dynamic keys
#41 | 2012-06-21Securing the implementation of a cryptographic process using key expansion
#42 | 2012-06-21Securing keys of a cipher using properties of the cipher process
#43 | 2012-05-17System and method for stream/block cipher with internal random states
#44 | 2012-05-17System and method for a derivation function for key per page
#45 | 2012-03-29System and method for authentication using a shared table and sorting exponentiation
#46 | 2012-02-23Apparatus and method for block cipher process for insecure environments
#47 | 2011-12-29System and method of authentication
#48 | 2011-12-29System and method for modulus obfuscation
#49 | 2011-12-29SYSTEM AND METHOD OF PERFORMING AUTHENTICATION
#50 | 2011-12-08HASH FUNCTION USING A REPEATED FUNCTION WITH SHIFTS
#51 | 2011-10-20Data transformation system using cyclic groups
#52 | 2011-10-06Obfuscating transformations on data array content and addresses
#53 | 2011-07-21HASH FUNCTION USING A QUASI-GROUP OPERATION
#54 | 2011-07-07SYSTEM AND METHOD FOR SOFTWARE DATA REFERENCE OBFUSCATION
#55 | 2011-05-19System and method for data obfuscation based on discrete logarithm properties
#56 | 2011-03-03HASH FUNCTION USING A DOMINO GAME PROCESS
#57 | 2011-03-03HASH FUNCTION BASED ON PAINTING TECHNIQUES
#58 | 2011-03-03Hash function using a heap modeling process
#59 | 2011-03-03Zero-knowledge based authentication method, system, and apparatus
#60 | 2011-03-03Encryption method and apparatus using composition of ciphers
#61 | 2011-02-17SPONGE AND HASH FUNCTIONS USING A RUBIK'S CUBE PUZZLE PROCESS
#62 | 2010-12-02Hash function using a card shuffling process
#63 | 2010-12-02Computer implemented masked representation of data tables
#64 | 2010-12-02HASH FUNCTION USING A ROULETTE GAME PROCESS
#65 | 2010-12-02Hash function using a cue sports game process
#66 | 2010-12-02HASH FUNCTION USING A CUE SPORTS GAME PROCESS
#67 | 2010-11-04Systems, methods, and computer-readable media for fertilizing machine-executable code
#68 | 2010-11-04Hash function based on polymorphic code
#69 | 2010-11-04Hash function using a piling-up process
#70 | 2010-06-17System and method for authentication using a shared table and sorting exponentiation
#71 | 2010-06-03SYSTEM AND METHOD FOR AUTHENTICATION BASED ON PARTICLE GUN EMISSIONS
#72 | 2010-05-06System and method for obfuscating constants in a computer program
#73 | 2010-05-06SYSTEM AND METHOD FOR DERIVATING DETERMINISTIC BINARY VALUES
#74 | 2010-05-06Hash functions using recurrency and arithmetic
#75 | 2010-05-06AGGREGATE AND PARALLELIZABLE HASH FUNCTION
#76 | 2010-04-22SCHEME FOR AUTHENTICATING WITHOUT PASSWORD EXCHANGE
#77 | 2010-04-22System and method for a derivation function for key per page
#78 | 2010-04-22System and method for stream/block cipher with internal random states
#79 | 2010-03-04System and method for revising boolean and arithmetic operations
#80 | 2010-03-04Systems and methods for implementing block cipher algorithms on attacker-controlled systems
#81 | 2010-03-04System and method for modulus obfuscation
#82 | 2010-02-04METHOD AND APPARATUS FOR DATA PROTECTION SYSTEM USING GEOMETRY OF FRACTALS OR OTHER CHAOTIC SYSTEMS
#83 | 2009-12-24Discrete key generation method and apparatus
#84 | 2009-11-12Security method and system for media playback devices
#85 | 2009-11-12System and method of performing authentication
#86 | 2009-11-12Secure distribution of data or content using keyless transformation
#87 | 2009-11-12System and method of authentication
#88 | 2009-10-29Computer enabled secure status return
#89 | 2009-10-08Combination white box/black box cryptographic processes and apparatus
#90 | 2009-10-01Silent time tampering detection
#91 | 2009-10-01Content protection information using family of quadratic multivariate polynomial maps
#92 | 2009-10-01BLOCK CIPHER WITH SECURITY INTRINSIC ASPECTS
#93 | 2009-10-01FOURIER SERIES BASED AUTHENTICATION/DERIVATION
#94 | 2009-09-24Exponentiation ladder for cryptography
#95 | 2009-09-17Computer object code obfuscation using boot installation
#96 | 2009-08-20Method and apparatus for verifying and diversifying randomness
#97 | 2009-06-18Method and apparatus for securing content using encryption with embedded key in content
#98 | 2008-11-27Media storage structures for storing content, devices for using such structures, systems for distributing such structures