The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
A confidential message can be transmitted with the exchange of a secure encryption function followed by an unencrypted message portion and encrypted portion to conserve coding and decoding time.
English (United States)
This text was extracted from a PDF file.
100% of the total text.
Page 1 of 1
Message Authentication With Partial Encrytion
A confidential message can be transmitted with the exchange of a secure
encryption function followed by an unencrypted message portion and encrypted
portion to conserve coding and decoding time.
Assume sender and recipient exchange a secure encryption function Es,
immune to cryptoanalytic attack, such as the Data Encryption System (DES)
function, but time-consuming to compute. Sender separates message M into
portions M1 and M2 and computes a sixteen bit Cyclic Redundancy Code (CRC)
function for M denoted CRC (M). These functions can be computed at high
rates. Sender then transmits the message Es (CRC(M),M2), M1. As the
message arrives, recipient begins decoding the first portion of the message to
obtain M2 and CRC(M). At the same time, CRC hardware computes
independently CRC(M), beginning with M1 in clear text. When M2 has been
decoded, CRC(M1,M2) can be computed. Message M is accepted only if this
equals the CRC encrypted in the message. An active eavesdropper can
determine M1 but not M2 and has no information about the CRC.