-
公开(公告)号:US20160328542A1
公开(公告)日:2016-11-10
申请号:US14815474
申请日:2015-07-31
Applicant: NXP B.V.
Inventor: Jan Hoogerbrugge , Wil Michiels , Pim Vullers
CPC classification number: G06F21/14 , G06F21/50 , G06F21/602 , G06F2221/0748 , H04L9/3066
Abstract: A method of obscuring software code implementing an elliptic curve cryptography (ECC) point multiplication function, including: receiving ECC parameters including a multiplier d having N bits; transforming multiplier d into an array d(i) with −1, 0, and +1 values while maintaining the same value for d; and generating ECC point multiplication function operations using the transformed multiplier array d(i) and N, wherein the generated ECC point multiplication function operations are split variable operations.
Abstract translation: 一种模糊实施椭圆曲线密码术(ECC)点乘法函数的软件代码的方法,包括:接收包括具有N位的乘法器d的ECC参数; 将乘数d变换为具有-1,0和+1值的数组d(i),同时保持d相同的值; 以及使用变换乘法器阵列d(i)和N生成ECC点乘法函数运算,其中所生成的ECC点乘法函数运算是分割可变运算。
-
公开(公告)号:US20210306852A1
公开(公告)日:2021-09-30
申请号:US16829401
申请日:2020-03-25
Applicant: NXP B.V
Inventor: Marcel Medwed , Pim Vullers , Joost Roland Renes , Stefan Lemsitzer
Abstract: A method is provided for authenticating one device to another device. In the method, a first device proves to a second device that a first credential comprising multiple first attributes is valid. The second device proves to the first device that a second credential comprising multiple second attributes is valid. The first device reveals a first attribute of the multiple first attributes to the second device. The second device verifies the first attribute and decides whether to continue revealing attributes. If continuing, the second device reveals to the first device a first attribute of the multiple second attributes. The first device verifies the first attribute of the multiple second attributes. The first device decides whether to continue revealing attributes. Attributes can be revealed until one of the first or second devices end the method or until no attributes of the multiple first and second attributes remain to be revealed.
-
公开(公告)号:US11272363B2
公开(公告)日:2022-03-08
申请号:US16829401
申请日:2020-03-25
Applicant: NXP B.V.
Inventor: Marcel Medwed , Pim Vullers , Joost Roland Renes , Stefan Lemsitzer
IPC: H04L29/06 , H04L9/32 , H04W12/06 , H04W12/037
Abstract: A method is provided for authenticating one device to another device. In the method, a first device proves to a second device that a first credential comprising multiple first attributes is valid. The second device proves to the first device that a second credential comprising multiple second attributes is valid. The first device reveals a first attribute of the multiple first attributes to the second device. The second device verifies the first attribute and decides whether to continue revealing attributes. If continuing, the second device reveals to the first device a first attribute of the multiple second attributes. The first device verifies the first attribute of the multiple second attributes. The first device decides whether to continue revealing attributes. Attributes can be revealed until one of the first or second devices end the method or until no attributes of the multiple first and second attributes remain to be revealed.
-
公开(公告)号:US10068070B2
公开(公告)日:2018-09-04
申请号:US14815474
申请日:2015-07-31
Applicant: NXP B.V.
Inventor: Jan Hoogerbrugge , Wil Michiels , Pim Vullers
Abstract: A method of obscuring software code implementing an elliptic curve cryptography (ECC) point multiplication function, including: receiving ECC parameters including a multiplier d having N bits; transforming multiplier d into an array d(i) with −1, 0, and +1 values while maintaining the same value for d; and generating ECC point multiplication function operations using the transformed multiplier array d(i) and N, wherein the generated ECC point multiplication function operations are split variable operations.
-
-
-