PROTECTION OF REGISTERS AGAINST UNILATERAL DISTURBANCES
    21.
    发明申请
    PROTECTION OF REGISTERS AGAINST UNILATERAL DISTURBANCES 审中-公开
    保护防止非法作战的登记

    公开(公告)号:US20160308673A1

    公开(公告)日:2016-10-20

    申请号:US14671019

    申请日:2015-03-27

    CPC classification number: G06F21/75 G06F21/72 G06F2221/2105 H04L9/004

    Abstract: A device includes one or more registers and circuitry. The circuitry subjects a key having a number of bits to a first function which takes a selection value into account, generating a result having a number of bits which is twice the number of bits of the key, and stores the result in the one or more registers. In response to a call for the key, the circuitry subjects the result stored in the one or more registers to a second function which takes the selection value into account to generate a response having a same value as the key.

    Abstract translation: 设备包括一个或多个寄存器和电路。 该电路将具有多个比特的密钥作为考虑到选择值的第一功能,产生具有该密钥比特数的两倍的比特数的结果,并将该结果存储在一个或多个 注册 响应于对键的调用,电路对存储在一个或多个寄存器中的结果进行考虑到选择值的第二函数,以产生具有与该键相同的值的响应。

    PROTECTION OF DATA STORED IN A VOLATILE MEMORY
    22.
    发明申请
    PROTECTION OF DATA STORED IN A VOLATILE MEMORY 有权
    保存在易失性存储器中存储的数据

    公开(公告)号:US20150356300A1

    公开(公告)日:2015-12-10

    申请号:US14668692

    申请日:2015-03-25

    Inventor: Yannick Teglia

    Abstract: A method of detecting a cold-boot attack on an integrated circuit including the steps of: transferring, into a first volatile memory of the integrated circuit, a pattern stored in a non-volatile memory of the circuit; periodically causing a switching down and a switching up of the first volatile memory; and verifying that the number of bits having switched state is within a range of values.

    Abstract translation: 一种检测集成电路的冷启动攻击的方法,包括以下步骤:向集成电路的第一易失性存储器传送存储在电路的非易失性存储器中的模式; 周期性地引起第一易失性存储器的切换和切换; 以及验证具有切换状态的位数在值的范围内。

    Protection of data stored in a volatile memory

    公开(公告)号:US10223532B2

    公开(公告)日:2019-03-05

    申请号:US15622991

    申请日:2017-06-14

    Inventor: Yannick Teglia

    Abstract: A method of detecting a cold-boot attack includes transferring, into a first volatile memory of an integrated circuit, a pattern stored in a non-volatile memory of the integrated circuit. Power to the non-volatile memory is periodically interrupted and an indication of a number of errors in the non-volatile memory is generated. The indication of the number of errors is compared to one or more thresholds. An occurrence of a cold-boot attack is detected based on the comparison. The pattern may be reloaded into the first volatile memory before each power interruption. The pattern may be selected so that the number of errors varies according to the integrated circuit temperature.

    PROTECTION OF A CALCULATION AGAINST SIDE-CHANNEL ATTACKS
    24.
    发明申请
    PROTECTION OF A CALCULATION AGAINST SIDE-CHANNEL ATTACKS 审中-公开
    保护对边界通道攻击的计算

    公开(公告)号:US20170070341A1

    公开(公告)日:2017-03-09

    申请号:US15354016

    申请日:2016-11-17

    Inventor: Yannick Teglia

    CPC classification number: H04L9/0618 H04L9/002 H04L9/003 H04L9/0869 H04L9/3066

    Abstract: A method for protecting a ciphering algorithm executing looped operations on bits of a first quantity and on a first variable initialized by a second quantity, wherein, for each bit of the first quantity, a random number is added to the state of this bit to update a second variable maintained between two thresholds.

    Abstract translation: 一种用于保护加密算法对第一数量的比特和由第二数量初始化的第一变量执行循环操作的方法,其中对于第一数量的每个比特,将随机数加到该比特的状态以更新 第二个变量保持在两个阈值之间。

    Cryptographic countermeasure method by deriving a secret data
    25.
    发明授权
    Cryptographic countermeasure method by deriving a secret data 有权
    通过导出秘密数据的加密对策方法

    公开(公告)号:US09363073B2

    公开(公告)日:2016-06-07

    申请号:US14091153

    申请日:2013-11-26

    Inventor: Yannick Teglia

    CPC classification number: H04L9/06 H04L9/002 H04L9/065 H04L9/30

    Abstract: A method of protecting a circuit from attacks aiming to discover secret data used during the execution of a cryptographic calculation by the circuit, by, executing a transformation calculation implementing a bijective transformation function, receiving as input a secret data, and supplying a transformed data, executing a cryptographic calculation receiving as input a data to process and the transformed data, and executing an inverse transformation calculation receiving as input the result of the cryptographic calculation, and supplying a result that the cryptographic calculation would have supplied if it had been applied to the data to process and directly to the secret data, the data to process belong to a stream of a multiplicity of data, the transformed data being supplied as input to the cryptographic calculation for all the data of the stream.

    Abstract translation: 一种保护电路免受攻击的方法,用于发现由电路执行密码计算期间使用的秘密数据,通过执行实现双射变换功能的变换计算,接收作为输入的秘密数据并提供经变换的数据, 执行作为输入接收要处理的数据的加密计算和经变换的数据,并且执行接收作为输入的加密计算的结果的逆变换计算,并且将如果已经应用于加密计算的结果提供给 要处理的数据并直接传送到秘密数据,要处理的数据属于多个数据流,转换的数据作为流的所有数据的密码计算的输入提供。

Patent Agency Ranking