1
Pankaj Rohatgi, Vincent Dureau: Apparatus and method for authenticating transmitting applications in an interactive TV system. Thomson Consumer Electronics, Joseph S Tripoli, Eric P Herrmann, Ronald H Kurdyla, April 29, 1997: US05625693 (185 worldwide citation)

An executable interactive program is combined with audio/video data for transmission. The program is divided into modules, similar to computer files, and a Directory Module is created which links program modules. Security for the executable application is provided by attaching a signed certificate t ...


2
Rosario Gennaro, Pankaj Rohatgi: How to sign digital streams. International Business Machines Corporation, Douglas W Cameron, Anne Vachon Dougherty, December 28, 1999: US06009176 (116 worldwide citation)

A method of signing digital streams so that a receiver of the stream can authenticate and consume the stream at the same rate which the stream is being sent to the receiver. More specifically, this invention involves computing and verifying a single digital signature on at least a portion of the str ...


3
Pankaj Rohatgi: Efficient hybrid public key signature scheme. International Business Machines Corporation, Louis P Herzberg, March 2, 2004: US06701434 (99 worldwide citation)

Methods, apparatus and computer products provide solutions to the problem caused by the slow speed of public key signature algorithms. The solutions also solve problems of packet authentication for multicast and other scenarios requiring fast, compact digital signatures. Security guarantees required ...


4
Rosario Gennaro, Pankaj Rohatgi: How to sign digital streams. International Business Machines Corporation, Douglas W Cameron, Anne Vachon Dougherty, October 30, 2001: US06311271 (94 worldwide citation)

A method of signing digital streams so that a receiver of the stream can authenticate and consume the stream at the same rate which the stream is being sent to the receiver. More specifically, this invention involves computing and verifying a single digital signature on at least a portion of the str ...


5
Paul C Kocher, Pankaj Rohatgi, Joshua M Jaffe: Verifiable, leak-resistant encryption and decryption. Cryptography Research, Finnegan Henderson Farabow Garrett & Dunner L, February 26, 2013: US08386800 (60 worldwide citation)

This patent describes techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device. The sensitive data ...


6
David Carroll Challener, Dhruv Manmohandas Desai, Pankaj Rohatgi, David Robert Safford: Method and apparatus for securing communication utilizing a security processor. International Business Machines Corporation, J Bruce Schelkopf, Bracewell & Patterson, October 30, 2001: US06311270 (58 worldwide citation)

A method is provided for communicating digital content between a content provider and a data processing system which is under the control of a content consumer, utilizing an insecure communication channel, such as the internet. A security processor is provided. The security processor is communicativ ...


7
Pankaj Rohatgi: Commitments in signatures. International Business Machines Corporation, Louis P Herzberg, November 30, 2004: US06826687 (29 worldwide citation)

The present invention provides methods and apparatus for generating a TCR-commitment having properties differing from the properties of a regular commitment. It provides solutions to the problem of packet authentication for multicast and other scenarios requiring fast, compact digital signature/comm ...


8
Pradeep K Dubey, Charanjit Jutla, Josyula R Rao, Pankaj Rohatgi, Atri Rudra, Vijay Kumar: Processing Galois Field arithmetic. International Business Machines Corporation, T Rao Coca Esq, McGinn & Gibb PLLC, July 20, 2004: US06766344 (12 worldwide citation)

Efficient parallel processing of algorithms involving Galois Field arithmetic use data slicing techniques to execute arithmetic operations on a computing hardware having SIMD (single-instruction, multiple-data) architectures. A W-bit wide word computer capable of operating on one or more sets of k-b ...


9
Suresh Narayana Chari, Vincenzo Valentino Diluoffo, Paul Ashley Karger, Elaine Rivette Palmer, Tal Rabin, Josyula Ramachandra Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David Claude Toll: Method, apparatus and system for resistance to side channel attacks on random number generators. International Business Machines Corporation, Keusey Tutunjian & Bitetto P C, Brian P Verminski Esq, February 24, 2009: US07496616 (10 worldwide citation)

A random number generator (RNG) resistant to side channel attacks includes an activation pseudo random number generator (APRNG) having an activation output connected to an activation seed input to provide a next seed to the activation seed input. A second random number generator includes a second se ...


10
Pau Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: System and method for fuzzy multi-level security. International Business Machines Corporation, Keusey Tutunjian & Bitetto P C, Joseph Jones, May 5, 2009: US07530110 (10 worldwide citation)

An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the r ...