SOFTWARE ENCRYPTION

Brand Owner (click to sort) Address Description
AJAX LUYSTER, FRANK C. 100 Riverside Lane Riverside CT 06878 software for encryption, related communications, and database;
BYTEGUARD LUYSTER, FRANK C. 100 Riverside Lane Riverside CT 06878 software for encryption, related communications, and database;BITE GUARD;
CRUNCH LUYSTER, FRANK C. 100 Riverside Lane Riverside CT 06878 software for encryption, related communications, and database;
CRYPTAINER ENCRSOFT PARTNERS 16, Prem Kunj - 3rd floor Sion, Mumbai 400022 India Software for encryption; computer hardware and software for use in creating a secure tool for storing and sharing information over computer networks in the field of information security;
HARDBYTE LUYSTER, FRANK C. 100 Riverside Lane Riverside CT 06878 software for encryption, related communications, and database;HARD BITE;
N-BIT Gemini Systems Premier Bank Tower, Suite 1102 Post Office Box 59 Shreveport LA 711610059 software for encryption, compression, arbitrary precision arithmetic, data translation, indexing, object management and communications; integrated circuits for encryption, compression, arbitrary precision arithmetic, data translations, indexing, object management and communications;
SILVERHAWK LUYSTER, FRANK C. 100 Riverside Lane Riverside CT 06878 software for encryption, related communications and database;SILVER HAWK;
WHISPLY Secomba GmbH Werner-von-Siemens-Str. 6 86159 Augsburg Germany Software for encryption; Software for encryption of cloud services; Software for encryption of cloud storage; computer software for file sharing; Computer software for secure file sharing; computer software for encrypted file sharing; privacy protection software for encrypting and sharing files;The name(s), portrait(s), and/or signature(s) shown in the mark does not identify a particular living individual.;Software licensing of software for protecting, encrypting and sharing files;The wording Whisply has no meaning in a foreign language.;Computer software updating; software as a Service (SaaS) services featuring software for protecting, encrypting and sharing files; providing temporary use of online non-downloadable software for protecting, encrypting and sharing files; providing temporary use of non-downloadable software for protecting, encrypting and sharing files; applications accessible via a website, namely, providing online non-downloadable software for protecting, encrypting and sharing files; computer software development;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The present invention proposes an encryption/decryption method able to resist against various attack strategies such as Simple Power Analysis, Timing Analysis or Differential Power Analysis. The method is carried out by a plurality of encryption/decryption modules arranged in series, wherein an encryption/decryption module, different from the first module, starts encryption/decryption operations as soon as said module receives a part of the results of encryption/decryption operations from the immediately preceding encryption/decryption module.