-
公开(公告)号:US12021969B2
公开(公告)日:2024-06-25
申请号:US17598189
申请日:2020-04-01
Applicant: Cryptography Research, Inc.
Inventor: Pascal Sasdrich , Begül Bilgin , Michael Hutter
CPC classification number: H04L9/0631 , H04L9/003 , H04L2209/04 , H04L2209/125
Abstract: An input data may be received. A portion of a cryptographic operation may be performed with the received input data at a first function component. During the performance of the cryptographic operation at the first function component, a pre-charge operation may be performed at a second function component. Furthermore, the second function component may be used to perform another portion of the cryptographic operation with a result of the portion of the cryptographic operation performed at the first function component.
-
公开(公告)号:US20240396709A1
公开(公告)日:2024-11-28
申请号:US18670037
申请日:2024-05-21
Applicant: Cryptography Research, Inc.
Inventor: Pascal Sasdrich , Begül Bilgin , Michael Hutter
Abstract: An input data may be received. A portion of a cryptographic operation may be performed with the received input data at a first function component. During the performance of the cryptographic operation at the first function component, a pre-charge operation may be performed at a second function component. Furthermore, the second function component may be used to perform another portion of the cryptographic operation with a result of the portion of the cryptographic operation performed at the first function component.
-
公开(公告)号:US20180212761A1
公开(公告)日:2018-07-26
申请号:US15856682
申请日:2017-12-28
Applicant: Cryptography Research, Inc.
Inventor: Begül Bilgin , Michael Hutter
CPC classification number: H04L9/0631 , H04L9/0625 , H04L9/065 , H04L9/0861
Abstract: Systems and methods for efficient computation of stream ciphers. An example system for implementing a stream cipher, may comprise: a sub-round computation circuit of a first type configured to perform a subset of transformations of a cipher computation round on a round input state, each transformation of the subset of transformations including at least one of: a bitwise addition operation, a bitwise exclusive disjunction operation, or a bitwise rotation operation. The sub-round computation circuit of the first type may comprise: one or more of sub-round computation circuits of a second type, wherein each sub-round computation circuit of the second type is configured to perform the subset of transformations of the cipher computation round on a respective part of the round input state.
-
公开(公告)号:US20240364497A1
公开(公告)日:2024-10-31
申请号:US18646554
申请日:2024-04-25
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Michael Alexander Hamburg , Begül Bilgin
IPC: H04L9/06
CPC classification number: H04L9/0618
Abstract: Disclosed systems and techniques include a cryptographic processor for processing of both unprotected data and protected data using an unprotected data path. In one implementation, the cryptographic processor includes a processing unit, and a control unit to selectively cause the processing unit to operate in a public mode or a secure mode. In the public mode, the processing unit performs a computational operation to compute a nonlinear function of a public data. In the secure mode, the processing unit computes, over a plurality of iterations, a plurality of shares of the nonlinear function of a secure data. At each iteration, the processing unit performs multiple instances of the computational operation to compute a respective share of the nonlinear function of the secure data.
-
公开(公告)号:US20220191004A1
公开(公告)日:2022-06-16
申请号:US17598189
申请日:2020-04-01
Applicant: Cryptography Research, Inc.
Inventor: Pascal Sasdrich , Begül Bilgin , Michael Hutter
Abstract: An input data may be received. A portion of a cryptographic operation may be performed with the received input data at a first function component. During the performance of the cryptographic operation at the first function component, a pre-charge operation may be performed at a second function component. Furthermore, the second function component may be used to perform another portion of the cryptographic operation with a result of the portion of the cryptographic operation performed at the first function component.
-
-
-
-