R
Rostislaw Prymak
Researcher at IBM
Publications - 19
Citations - 1969
Rostislaw Prymak is an academic researcher from IBM. The author has contributed to research in topics: Key management & Key (cryptography). The author has an hindex of 15, co-authored 19 publications receiving 1969 citations.
Papers
More filters
Patent
Method and system for multimedia access control enablement
Bernard J. Halter,Alphonse M. Bracco,Donald B. Johnson,An V. Le,Stephen M. Matyas,Rostislaw Prymak,James D. Randall,John D. Wilkins +7 more
TL;DR: In this article, a method and system are disclosed for securely distributing a plurality of software files from a software distribution processor to a user processor, while selectively enabling the user processor to only use a subset of a lesser plurality of the software files.
Patent
Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
Stephen M. Matyas,Donald B. Johnson,An V. Le,William C Martin,Rostislaw Prymak,William S Rohland,John D. Wilkins +6 more
TL;DR: In this paper, the authors describe a method and apparatus for securely distributing an initial Data Encryption Algorithm (DEA) key-encrypting key by encrypting a key record (consisting of the key encryption key and control information associated with it) using a public key algorithm and a private key belonging to the intended recipient.
Patent
Public key cryptosystem key management based on control vectors
Stephen M. Matyas,Donald B. Johnson,An V. Le,Rostislaw Prymak,William C Martin,William S Rohland,John D. Wilkins +6 more
TL;DR: In this article, a data processing system, method and program are disclosed, for managing a public key cryptographic system, which includes the steps of generating a first public key and a first private key as a first pair in the data process system, for use with a first key algorithm and further generating a second public key, and a second private key, as a second pair, for using with a second key algorithm, and encrypting the private key record under a first master key expression which is a function of the private control vector.
Patent
Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
Stephen M. Matyas,Donald B. Johnson,An V. Le,Rostislaw Prymak,William C Martin,William S Rohland,John D. Wilkins +6 more
TL;DR: In this article, the authors present a public key cryptographic network, where the certification center is required to verify at the time device A requests certification of its public key PUMa, that device A is configured with the currently authorized configuration vector.
Patent
Cryptographic facility environment backup/restore and replication in a public key cryptosystem
Stephen M. Matyas,Donald B. Johnson,An V. Le,Rostislaw Prymak,William C Martin,William S Rohland,John D. Wilkins +6 more
TL;DR: In this paper, the authors describe a system that includes a first cryptographic facility containing a portable part which personalizes the first cryptographic device and a second cryptographic device which is linked to the first by a public key cryptographic system.