-
公开(公告)号:US10389520B2
公开(公告)日:2019-08-20
申请号:US15516662
申请日:2015-09-25
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Michael Tunstall
Abstract: A first share value and a second share value may be received. A combination of the first share value and the second share value may correspond to an exponent value. The value of a first register is updated using a first equation that is based on the first and second share values and the value of a second register is updated using a second equation that is based on the second share value. One of the value of the first register or the value of the second register is selected based on a bit value of the second share value.
-
公开(公告)号:US20180351729A1
公开(公告)日:2018-12-06
申请号:US15533974
申请日:2015-12-03
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Michael Tunstall , Francois Durvaux, Jr.
CPC classification number: H04L9/003 , H04L2209/046
Abstract: A value corresponding to an input for a cryptographic operation may be received. The value may be masked by multiplying the value with a first number modulo a prime number. The cryptographic operation may subsequently be performed on the masked value.
-
公开(公告)号:US11863657B2
公开(公告)日:2024-01-02
申请号:US18061879
申请日:2022-12-05
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Michael Tunstall
CPC classification number: H04L9/003 , H04L9/0825 , H04L9/302 , H04L9/3249 , H04L2209/046
Abstract: Aspects of the present disclosure involves receiving an input message, generating a first random value that is used to blind the input message to prevent a side-channel analysis (SCA) attack, computing a second random value using the first random value and a factor used to compute the Montgomery form of a blinded input message without performing an explicit Montgomery conversion of the input message, and computing a signature using Montgomery multiplication, of the first random value and the second random value, wherein the signature is resistant to the SCA attack.
-
公开(公告)号:US11822704B2
公开(公告)日:2023-11-21
申请号:US17290027
申请日:2019-10-28
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Michael Hutter , Michael Tunstall
CPC classification number: G06F21/72 , G06F21/755 , H04L9/003
Abstract: A first arithmetic input share and a second arithmetic input share of an initial arithmetically-masked cryptographic value are received. A sequence of operations using the arithmetic input shares and a randomly generated number is performed, where a current operation in the sequence of operations generates a corresponding intermediate value that is used in a subsequent operation. At the end of the sequence of operations, a first Boolean output share and a second Boolean output share are generated. The arithmetic-to-Boolean mask conversion is independent of the input bit length.
-
公开(公告)号:US20230198739A1
公开(公告)日:2023-06-22
申请号:US17864230
申请日:2021-01-20
Applicant: Cryptography Research, Inc.
Inventor: Michael Tunstall
Abstract: Computing devices, methods, and systems for corrections to the “almost” binary extended GCD in a cryptographic operation of a cryptographic process are disclosed. Exemplary implementations may: receive, from a cryptographic process, a command to compute a binary extended greatest common denominator of a first input value and a second input value for a cryptographic operation; compute, by a binary extended GCD algorithm, the binary extended GCD using a multiplication with an inverse of two, instead of a division by two, to obtain a first output value; compute, by the binary extended GCD algorithm, a second output value and a third output value; and return, to the cryptographic process, the first output value, the second output value, and the third output value.
-
公开(公告)号:US20230179395A1
公开(公告)日:2023-06-08
申请号:US18061879
申请日:2022-12-05
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Michael Tunstall
CPC classification number: H04L9/003 , H04L9/0825 , H04L9/302 , H04L9/3249 , H04L2209/046
Abstract: Aspects of the present disclosure involves receiving an input message, generating a first random value that is used to blind the input message to prevent a side-channel analysis (SCA) attack, computing a second random value using the first random value and a factor used to compute the Montgomery form of a blinded input message without performing an explicit Montgomery conversion of the input message, and computing a signature using Montgomery multiplication, of the first random value and the second random value, wherein the signature is resistant to the SCA attack.
-
公开(公告)号:US11658799B2
公开(公告)日:2023-05-23
申请号:US17339689
申请日:2021-06-04
Applicant: Cryptography Research, Inc.
Inventor: Michael Tunstall
CPC classification number: H04L9/003 , G06F7/723 , G06F21/755 , G06F2207/7242
Abstract: A first share value and a second share value may be received. A combination of the first share value and the second share value may correspond to an exponent value. The value of a first register is updated using a first equation that is based on the first and second share values and the value of a second register is updated using a second equation that is based on the second share value. One of the value of the first register or the value of the second register is selected based on a bit value of the second share value.
-
公开(公告)号:US11626970B2
公开(公告)日:2023-04-11
申请号:US15533974
申请日:2015-12-03
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Michael Tunstall , Francois Durvaux, Jr.
Abstract: A value corresponding to an input for a cryptographic operation may be received. The value may be masked by multiplying the value with a first number modulo a prime number. The cryptographic operation may subsequently be performed on the masked value.
-
29.
公开(公告)号:US11620109B2
公开(公告)日:2023-04-04
申请号:US17124374
申请日:2020-12-16
Applicant: Cryptography Research, Inc.
Inventor: Michael Hutter , Michael Tunstall
IPC: G06F21/72 , H04L9/06 , H04L9/14 , H04L9/30 , G06F7/58 , H04L9/00 , G09C1/00 , G06F7/76 , G06F7/00
Abstract: A first input share value, a second input share value, and a third input share value may be received. The first input share value may be converted to a summation or subtraction between an input value and a combination of the second input share value and the third input share value. A random number value may be generated and combined with the second input share value and the third input share value to generate a combined value. Furthermore, a first output share value may be generated based on a combination of the converted first input share value, the combined value, and additional random number values.
-
公开(公告)号:US11032060B2
公开(公告)日:2021-06-08
申请号:US16534719
申请日:2019-08-07
Applicant: Cryptography Research, Inc.
Inventor: Michael Tunstall
Abstract: A first share value and a second share value may be received. A combination of the first share value and the second share value may correspond to an exponent value. The value of a first register is updated using a first equation that is based on the first and second share values and the value of a second register is updated using a second equation that is based on the second share value. One of the value of the first register or the value of the second register is selected based on a bit value of the second share value.
-
-
-
-
-
-
-
-
-