1
Ronald L Rivest, Adi Shamir, Leonard M Adleman: Cryptographic communications system and method. Massachusetts Institute of Technology, Arthur A Smith Jr, Robert J Horn Jr, September 20, 1983: US04405829 (1106 worldwide citation)

A cryptographic communications system and method. The system includes a communications channel coupled to at least one terminal having an encoding device and to at least one terminal having a decoding device. A message-to-be-transferred is enciphered to ciphertext at the encoding terminal by first e ...


2
John G Brainard, Burton S Kaliski Jr, Magnus Nyström, Ronald L Rivest: System and method for authentication seed distribution. RSA Security, Wilmer Cutler Pickering Hale and Dorr, January 10, 2006: US06985583 (286 worldwide citation)

In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation funct ...


3
John G Brainard, Burton S Kaliski Jr, Ronald L Rivest: Method and apparatus for performing enhanced time-based authentication. RSA Security, BainwoodHuang, April 22, 2008: US07363494 (236 worldwide citation)

A time-based method for generating an authentication code associated with an entity uses an authentication code generated from a secret, a dynamic, time-varying variable, and the number of previous authentication code generations within the particular time interval. Other information such as a perso ...


4
Ronald L Rivest, Matthew John Barton Robshaw, Raymond Mark Sidney, Yiqun Lisa Yin: Enhanced block ciphers with data-dependent rotations. RSA Security, Testa Hurwitz & Thibeault, July 31, 2001: US06269163 (232 worldwide citation)

A plaintext message to be encrypted is segmented into a number of words, e.g., four words stored in registers A, B, C and D, and an integer multiplication function is applied to a subset of the words, e.g., to the two words in registers B and D. The integer multiplication function may be a quadratic ...


5
Ari Juels, Ronald L Rivest, Michael Szydlo: Method and apparatus for selective blocking of radio frequency identification devices. RSA Security, Ryan Mason & Lewis, November 29, 2005: US06970070 (214 worldwide citation)

Techniques are disclosed for providing enhanced privacy in an RFID system comprising a plurality of RFID devices, each having an associated identifier, and at least one reader which communicates with one or more of the devices. A blocker device is operative to receive a communication directed from t ...


6
John G Brainard, Burton S Kaliski Jr, Magnus Nyström, Ronald L Rivest: System and method for authentication seed distribution. RSA Security, BainwoodHuang, March 10, 2009: US07502467 (180 worldwide citation)

In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation funct ...


7
Ronald L Rivest: Data center for remote postage meter recharging system having physically secure encrypting apparatus and employing encrypted seed number signals. Pitney Bowes, David E Pitchenik, Mr W D Soltow Jr, Albert W Scribner, March 8, 1983: US04376299 (126 worldwide citation)

A data center for remote postage meter recharging receives resetting signal information to reset a remotely located postage meter. The remotely located postage meter has signal information stored therein for use in recharging the meter with additional postage in conjunction with a signal information ...


8
Russell W Pogue Jr, Ronald L Rivest: Method of secure remote access. Delco Electronics Corporation, A Frank Duke, September 1, 1992: US05144667 (121 worldwide citation)

Access to a vehicle by a remote electronic key via a radio link is secured by an exchange of encrypted signals. A remote unit having a secret number is introduced to a base unit and a common key is agreed upon by an exponential key exchange. The common key is encrypted using the secret number and st ...


9
Ronald L Rivest: Block encryption algorithm with data-dependent rotations. RSA Data Security, Nixon & Vanderhye P C, March 3, 1998: US05724428 (79 worldwide citation)

A simple encryption and decryption device has been developed. The underlying algorithm is a fast block cipher that may be implemented efficiently in hardware or software. The algorithm makes heavy use of data-dependent rotations. The amount of each rotation depends on the data being encrypted and in ...


10
Ronald L Rivest: Block encryption algorithm with data-dependent rotations. RSA Data Security, Testa Hurwitz & Thibeault, November 10, 1998: US05835600 (51 worldwide citation)

A simple encryption and decryption device has been developed. The underlying algorithm is a fast block cipher that may be implemented efficiently in hardware or software. The algorithm makes heavy use of data-dependent rotations. The amount of each rotation depends on the data being encrypted and in ...