ENCRYPTION

Brand Owner (click to sort) Address Description
DEEP ENCRYPTION APERVITA, INC. 1 N. LASALLE ST., SUITE 1400 CHICAGO IL 60602 ENCRYPTION;Data encryption services; data encryption and decoding services; electronic data storage and transmission security services in the nature of data encryption services for providing security for electronically transmitted and stored patient health files; Software as a service (SAAS) services featuring software for organizing, tracking, sharing, and analyzing patient health files; computer services, namely, data encryption of patient health files; computer services, namely, acting as an application service provider in the field of information management to host computer application software for the purpose of organizing, tracking, sharing and analyzing patient health files; platform as a service (PAAS) featuring computer software platforms for organizing, tracking, sharing and analyzing patient health files; platform as a service (PAAS) featuring computer software platforms for data encryption of patient health files;
ENCRYPTION MAX MBSi Corp. 2301 West Dunlap Avenue #211 Phoenix AZ 85021 ENCRYPTION;Software as a service (SAAS) services featuring software for data encryption in the field of collateral recovery;
PHAWK LUYSTER, FRANK C. 100 Riverside Lane Riverside CT 06878 encryption, related communications, and database;P HAWK;
PRIVACYHAWK LUYSTER, FRANK C. 100 Riverside Lane Riverside CT 06878 encryption, related communications, and database;PRIVACY HAWK;
SERVERLESS ENCRYPTION Absio Corporation 8740 Lucent Boulevard, Suite 101 Highlands Ranch CO 80129 ENCRYPTION;Computer software development; Consulting in the field of information technology; Design and development of computer software; Design and development of computer software for protection and distribution of digital content; Software as a service (SAAS) services featuring software for protection and distribution of digital content; Software development in the field of protection and distribution of digital content; Data encryption services;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The present invention proposes an encryption/decryption method able to resist against various attack strategies such as Simple Power Analysis, Timing Analysis or Differential Power Analysis. The method is carried out by a plurality of encryption/decryption modules arranged in series, wherein an encryption/decryption module, different from the first module, starts encryption/decryption operations as soon as said module receives a part of the results of encryption/decryption operations from the immediately preceding encryption/decryption module.