-
公开(公告)号:US10747907B2
公开(公告)日:2020-08-18
申请号:US14955269
申请日:2015-12-01
Applicant: Cryptography Research, Inc
Inventor: Andrew John Leiserson , Mark Evan Marson
Abstract: A cryptographic accelerator (processor) retrieves data blocks for processing from a memory. These data blocks arrive and are stored in an input buffer in the order they were stored in memory (or other known order)—typically sequentially according to memory address (i.e., in-order.) The processor waits until a certain number of data blocks are available in the input buffer and then randomly selects blocks from the input buffer for processing. This randomizes the processing order of the data blocks. The processing order of data blocks may be randomized within sets of data blocks associated with a single read transaction, or across sets of data blocks associated with multiple read transactions.
-
公开(公告)号:US20170070485A1
公开(公告)日:2017-03-09
申请号:US14949254
申请日:2015-11-23
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , Mark Evan Marson , Daniel Robert Beitel
CPC classification number: H04L9/3066 , G06F21/606 , G06F2221/2107 , G06F2221/2111 , H04L9/0872 , H04L9/3263 , H04L63/0442 , H04L63/107 , H04W4/046 , H04W4/40 , H04W12/02
Abstract: Encrypted data transmitted from a second entity to a first entity may be received. The encrypted data may be encrypted by a location based public key based on a public key and a location associated with the second entity. A location associated with the first entity may be identified. A location based private key may be generated based on a private key that corresponds to the public key and the location associated with the first entity. Furthermore, the encrypted data may be decrypted with the location based private key when the location associated with the first entity matches the location associated with the second entity.
Abstract translation: 可以接收从第二实体发送到第一实体的加密数据。 可以基于公钥和与第二实体相关联的位置的基于位置的公钥来加密加密数据。 可以识别与第一实体相关联的位置。 基于位置的私钥可以基于对应于公钥的私钥和与第一实体相关联的位置来生成。 此外,当与第一实体相关联的位置与与第二实体相关联的位置匹配时,加密数据可以用基于位置的私钥进行解密。
-
23.
公开(公告)号:US20250038977A1
公开(公告)日:2025-01-30
申请号:US18784550
申请日:2024-07-25
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Disclosed aspects and implementations are directed to systems and techniques for protecting cryptographic operations against side-channel attacks. In one example, polynomials associated with secret data and public data defined on a working domain having a first dimension are mapped to an auxiliary domain having a larger second dimension. The mapped polynomials are masked using masking polynomials associated with a kernel of a homomorphism transformation from the auxiliary domain to the working domain. One or more computations are then performed on the masked polynomials in the auxiliary domain and an output is transformed from the auxiliary domain to the working domain.
-
公开(公告)号:US11706026B2
公开(公告)日:2023-07-18
申请号:US17389746
申请日:2021-07-30
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , Mark Evan Marson , Daniel Robert Beitel
IPC: H04L9/30 , H04L9/32 , H04W12/02 , G06F21/60 , H04L9/08 , H04L9/40 , H04W12/63 , H04W4/40 , H04W4/46
CPC classification number: H04L9/3066 , G06F21/606 , H04L9/0872 , H04L9/3263 , H04W12/02 , G06F2221/2107 , G06F2221/2111 , H04L63/0442 , H04L63/107 , H04W4/40 , H04W4/46 , H04W12/63
Abstract: A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.
-
25.
公开(公告)号:US20230093306A1
公开(公告)日:2023-03-23
申请号:US17948017
申请日:2022-09-19
Applicant: Cryptography Research, Inc.
Inventor: Michael Alexander Hamburg , Helena Handschuh , Mark Evan Marson , Winthrop John Wu
IPC: H04L9/06
Abstract: Aspects of the present disclosure involve a method and a system to perform the method to obtain a cryptographic output of a plurality of rounds of a cipher, by performing a plurality of modified rounds of the cipher, each of the modified rounds computing an unmasking transform, an operation of a respective round of the cipher, and a masking transform, the unmasking transform being an inverse of the masking transform of a previous round of the cipher.
-
公开(公告)号:US20220405428A1
公开(公告)日:2022-12-22
申请号:US17862134
申请日:2022-07-11
Applicant: Cryptography Research, Inc.
Inventor: Andrew John Leiserson , Mark Evan Marson , Megan Anneke Wachs
Abstract: A method of and system for gate-level masking of secret data during a cryptographic process is described. A mask share is determined, wherein a first portion of the mask share includes a first number of zero-values and a second number of one-values, and a second portion of the mask share includes the first number of one-values and the second number of zero-values. Masked data values and the first portion of the mask share are input into a first portion of masked gate logic, and the masked data values and the second portion of the mask share are input into a second portion of the masked gate logic. A first output from the first portion of the masked gate logic and a second output from the second portion of the masked gate logic are identified, wherein either the first output or the second output is a zero-value.
-
公开(公告)号:US20220197981A1
公开(公告)日:2022-06-23
申请号:US17553545
申请日:2021-12-16
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
28.
公开(公告)号:US20210271542A1
公开(公告)日:2021-09-02
申请号:US16972560
申请日:2019-06-05
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Scott C. Best , Helena Handschuh , Winthrop John Wu
Abstract: A value corresponding to a physical variation of a device may be received. Furthermore, helper data associated with the physical variation of the device may be received. A result data may be generated based on a combination of the value corresponding to the physical variation of the device and the helper data. An error correction operation may be performed on the result data to identify one or more code words associated with the error correction operation. Subsequently, a target data may be generated based on the one or more code words.
-
公开(公告)号:US11082224B2
公开(公告)日:2021-08-03
申请号:US16445708
申请日:2019-06-19
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , Mark Evan Marson , Daniel Robert Beitel
IPC: H04L9/30 , H04L9/32 , H04W12/02 , G06F21/60 , H04L9/08 , H04L29/06 , H04W12/63 , H04W4/40 , H04W4/46
Abstract: A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.
-
公开(公告)号:US10341106B2
公开(公告)日:2019-07-02
申请号:US15900722
申请日:2018-02-20
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , Mark Evan Marson , Daniel Robert Beitel
IPC: H04K1/00 , H04L9/00 , H04L9/08 , H04L9/32 , H04L9/30 , H04W12/02 , G06F21/60 , H04L29/06 , H04W4/04 , H04W4/40
Abstract: A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.
-
-
-
-
-
-
-
-
-