ENERGY ANALYSIS FOR DIFFERENTIAL POWER ANALYSIS RESISTANCE
    112.
    发明申请
    ENERGY ANALYSIS FOR DIFFERENTIAL POWER ANALYSIS RESISTANCE 审中-公开
    不同功率分析电阻的能量分析

    公开(公告)号:US20160140274A1

    公开(公告)日:2016-05-19

    申请号:US14896877

    申请日:2014-06-20

    Abstract: A first and second set of simulation information of a circuit design may be received. Energy consumption values associated with signals may be calculated for each of the first and second sets of simulation information of the circuit design. The energy consumption values associated with the transitions of the plurality of signals for each time point of a plurality of time points may be aggregated based on when each of the transitions of the signals occurs for each of the first and second sets of simulation information. Furthermore, a possible Differential Power Analysis (DPA) leak may be identified at one of the time points based on a difference in aggregated energy consumption values between the first and second sets of simulation information.

    Abstract translation: 可以接收电路设计的第一和第二组仿真信息。 可以针对电路设计的第一组和第二组模拟信息中的每一个来计算与信号相关联的能量消耗值。 可以基于对于第一和第二组模拟信息中的每一个发生信号的每个转换何时聚合与多个时间点中的每个时间点的多个信号的转变相关联的能量消耗值。 此外,可以基于第一组和第二组模拟信息之间的聚合能量消耗值的差异在一个时间点上识别可能的差分功率分析(DPA)泄漏。

    SIGNAL TRANSITION ANALYSIS OF A CIRCUIT
    113.
    发明申请
    SIGNAL TRANSITION ANALYSIS OF A CIRCUIT 有权
    电路信号转换分析

    公开(公告)号:US20160133341A1

    公开(公告)日:2016-05-12

    申请号:US14896901

    申请日:2014-06-20

    Abstract: A first signal and a second signal associated with a circuit may be identified. A first count of a number of times that the second signal is associated with a transition when the first signal is at a first value may be determined. Furthermore, a second count of a number of times that the second signal is associated with a transition when the first signal is at a second value may be determined. A value corresponding to the dependence between the second signal and the first signal may be calculated based on the first count and the second count.

    Abstract translation: 可以识别与电路相关联的第一信号和第二信号。 可以确定当第一信号处于第一值时第二信号与转变相关联的次数的第一计数。 此外,可以确定第二信号与第一信号处于第二值时的转变相关联的次数的第二计数。 可以基于第一计数和第二计数来计算与第二信号和第一信号之间的依赖关系相对应的值。

    MODULES TO SECURELY PROVISION AN ASSET TO A TARGET DEVICE
    114.
    发明申请
    MODULES TO SECURELY PROVISION AN ASSET TO A TARGET DEVICE 有权
    向目标设备安全提供资产的模块

    公开(公告)号:US20150326567A1

    公开(公告)日:2015-11-12

    申请号:US14535194

    申请日:2014-11-06

    Abstract: The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation phase of a manufacturing lifecycle of the target device in a cryptographic manager (CM) environment. One implementation includes a Root Authority (RA) device that receives a command to create a Module and executes a Module Template to generate the Module in response to the command. The Module is deployed to an Appliance device. A set of instructions of the Module, when executed by the Appliance device, results in a secure construction of a sequence of operations to securely provision a data asset to the target device. The Appliance device is configured to distribute the data asset to a cryptographic manager (CM) core of the target device.

    Abstract translation: 本文描述的实施例描述了用于模块管理的技术,包括在加密管理器(CM)环境中的目标设备的制造生命周期的操作阶段中的模块创建和模块部署到目标设备。 一个实现包括根授权(RA)设备,其接收创建模块的命令并执行模块模板以响应于该命令生成模块。 模块部署到设备设备。 当由设备设备执行时,该模块的一组指令导致一系列操作的安全构造,以将数据资产安全地提供给目标设备。 设备设备被配置为将数据资产分发到目标设备的加密管理器(CM)核心。

    TECHNIQUES AND DEVICES FOR CONFIGURABLE MEMORY ENCRYPTION AND AUTHENTICATION

    公开(公告)号:US20250165408A1

    公开(公告)日:2025-05-22

    申请号:US18839408

    申请日:2023-02-24

    Abstract: Disclosed systems and techniques involve flexible encryption, decryption, retrieval, and authentication of data. The systems may include a cryptographic processor that, in a first selectable mode of operation is configured to identify plaintext blocks, generate encrypted ciphertext blocks, process sequentially the ciphertext blocks to obtain an authentication value, encrypt the authentication value, and store the ciphertext blocks and an authentication tag, obtained based on the encrypted authentication value. In a second selectable mode, the cryptographic processor may perform ciphertext block encryption but forgo obtaining the authentication value.

    Efficient integrity monitoring of processing operations with multiple memory arrays

    公开(公告)号:US12287874B2

    公开(公告)日:2025-04-29

    申请号:US17992221

    申请日:2022-11-22

    Abstract: Disclosed systems and techniques are directed to efficient integrity monitoring of computational operations using multiple memory arrays collectively representative of known events associated with the computational operations. Disclosed techniques include obtaining event identification value representative of a state of the computing device associated with execution of an operation on the computing device, obtaining memory pointers and selecting, based on the memory pointers, mapping values from multiple memory arrays, computing an event response value, and classifying the operation among a plurality of classes, based on the event response value.

    Protecting polynomial hash functions from external monitoring attacks

    公开(公告)号:US12261935B2

    公开(公告)日:2025-03-25

    申请号:US17105247

    申请日:2020-11-25

    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.

Patent Agency Ranking