1
Shamir Adi: Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications.. Yeda Res & Dev, November 15, 1995: EP0682327-A2 (49 worldwide citation)

Memory efficient variants of public key encryption and identification schemes for smart card applications with severely limited RAM without using dedicated coprocessors. The variants replace the memory-intensive modular multiplication operation z = x*y (mod n) by a new randomized multiplication oper ...


2
Shamir Adi: Improved variants of the fiat-shamir identification and signature scheme.. Yeda Res & Dev, July 26, 1989: EP0325238-A2 (20 worldwide citation)

A method of proving the identify of an entity comprising the steps of establishing a public key for the entity consisting of a modulus n which is the product of at least two prime numbers, and a sequence of k numbers v1,...,vk (10); computing a private key (12) for the entity consisting of k numbers ...


3
Shamir Adi, Fiat Amos: Method, apparatus and article for identification and signature.. Yeda Res & Dev, January 13, 1988: EP0252499-A2 (14 worldwide citation)

A method and apparatus for simple identification and signature which enable any user to prove his identity and the authenticity of his messages to any other user. The method and apparatus are provably secure against any known or chosen message attack if factoring is difficult, and require only 1% to ...


4
Shamir Adi: Protecting smart cards from power analysis with detached power supplies. Yeda Res And Dev An Isr, July 4, 2001: EP1113386-A2 (14 worldwide citation)

A method and apparatus for protecting smart cards against simple and differential power attacks when they are inserted into card readers controlled by other entities. The technique is particularly useful in financial applications such as ATM cards, credit cards, and electronic wallets, in which card ...


5
Shamir Adi: Validating encrypted security pixel array.. Yeda Res & Dev, November 8, 1995: GB2289016-A (11 worldwide citation)

A method for protecting visual information against unauthorized access and modification using a printed cryptographic watermark includes printing a first array of shapes on a first sheet of material to be watermarked and printing a second array of shapes on a second sheet of material which is transp ...


6
Matias Yossi, Shamir Adi: Video scrambling apparatus & method based on space filling curves.. Yeda Res & Dev, February 22, 1989: EP0304217-A2 (10 worldwide citation)

A method of encrypting a video signal employing a pseudo-random Space Filling Curve having a highly irregular scanning pattern for scanning the pixel addresses of a video picture stored in a frame buffer. The method is used with a video scrambler/descrambler device and is characterized by a much hig ...


7
Shamir Adi: Method and apparatus for user identification based on permuted kernels.. Yeda Res & Dev, October 3, 1990: EP0389895-A1 (3 worldwide citation)

A method and apparatus for identification of a prover to a verifier in which the prover demonstrates his knowledge of a secret permutation pi such that V pi ELEMENT K(A) for publicly known A and V where all the arithmetic operations are carried out modulo p. The actual proof does not reveal any know ...


8
SHAMIR ADI: Apparatus and methods thereof for power consumption measurement at circuit breaker points. PANORAMIC POWER, October 21, 2010: WO/2010/119332 (3 worldwide citation)

Apparatus and methods are provided for the measurement of power consumption at points of interest, such as circuit breakers, machines, and the like. Accordingly, means are provided for measurement of power consumption for each electrical sub-network that is controlled by a circuit breaker. Each appa ...


9
Shamir Adi, Aljadeff Daniel, Amsalem Reuven: Improved room separation in a WLAN based RTLS and method therefore. Aeroscout, February 10, 2010: EP2151696-A1 (2 worldwide citation)

A wireless location system for tracking and locating a wireless tag in a structure having defined areas that provides for differentiation between the defined areas has at least one ultrasonic transmitter positioned in each of the defined areas for transmitting an ultrasonic signal having area identi ...


10
Shamir Adi: Method and apparatus for protecting rfid tags from power analysis. Yeda Research & Development, Shamir Adi, Fleit Lois, FLEIT Martin, February 14, 2008: WO/2008/019246 (2 worldwide citation)

RFID tags were believed to be immune to power analysis since they have no direct connection to an external power supply. However, recent research has shown that they s are vulnerable to such attacks, since it is possible to measure their power consumption remotely via a completely passive attack. Th ...



Click the thumbnails below to visualize the patent trend.