-
公开(公告)号:US12099622B2
公开(公告)日:2024-09-24
申请号:US17553536
申请日:2021-12-16
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
CPC classification number: G06F21/6218 , G06F21/14 , G06F21/6227 , G06N3/02 , G06N3/048 , G06V10/82
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
公开(公告)号:US20190342092A1
公开(公告)日:2019-11-07
申请号:US16405065
申请日:2019-05-07
Applicant: Cryptography Research, Inc.
Inventor: Helena Handschuh
Abstract: An indication of a key generation function may be received from a server. A random value may be received based on a volatile memory of a device. A cryptographic key may be generated based on the key generation function from the server and the random value that is based on the volatile memory of the device. The cryptographic key may be stored at a non-volatile memory of the device.
-
公开(公告)号:US20190018934A1
公开(公告)日:2019-01-17
申请号:US16122362
申请日:2018-09-05
Applicant: Cryptography Research, Inc.
Inventor: Paul C. Kocher , Helena Handschuh
IPC: G06F21/10
CPC classification number: G06F21/10 , G06F2221/0724
Abstract: A media storage device includes a media security controller circuit and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller circuit sends a message to the rendering device that causes the rendering device to obtain a portion of data from memory of the media storage device and provide it to the media security controller circuit. The portion is received and transformed by the media security controller circuit. The media security controller circuit sends the transformed portion to the rendering device.
-
公开(公告)号:US20250036726A1
公开(公告)日:2025-01-30
申请号:US18794631
申请日:2024-08-05
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
公开(公告)号:US20240413968A1
公开(公告)日:2024-12-12
申请号:US18732270
申请日:2024-06-03
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Aspects and implementations are directed to systems and techniques for protecting cryptographic operations against side-channel attacks by masking a ciphertext data using one or more masks randomly sampled from a null space associated with a tensor representation of a secret data and generating a plaintext data using the masked ciphertext data.
-
公开(公告)号:US11936783B2
公开(公告)日:2024-03-19
申请号:US17305416
申请日:2021-07-07
Applicant: Cryptography Research, Inc.
Inventor: Helena Handschuh
CPC classification number: H04L9/0869 , H04L9/006 , H04L9/0643 , H04L9/0816 , H04L9/0866 , H04L9/0897
Abstract: An indication of a key generation function may be received from a server. A random value may be received based on a volatile memory of a device. A cryptographic key may be generated based on the key generation function from the server and the random value that is based on the volatile memory of the device. The cryptographic key may be stored at a non-volatile memory of the device.
-
7.
公开(公告)号:US20230254115A1
公开(公告)日:2023-08-10
申请号:US18008602
申请日:2021-06-04
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Michael Alexander Hamburg , Helena Handschuh , Mark Evan Marson
CPC classification number: H04L9/0631 , G06F17/142
Abstract: Aspects of the present disclosure involve a method and a system to perform a cryptographic operation that involves a number theoretic transformation of a first vector to a second vector by obtaining components of the first vector, performing a plurality of iterations that each include determining a plurality of output values, wherein each of the plurality of output values is a linear combination of two or more input values, the input values into a first iteration being the components of the first vector and the output values of the last iteration being representative of components of the second vector, and wherein one or more of the output values of at least one iteration are randomized by multiplying at least one input value by a random number, and determining, based on the output values of the last of the plurality of iterations, the components of the second vector.
-
8.
公开(公告)号:US20250038977A1
公开(公告)日:2025-01-30
申请号:US18784550
申请日:2024-07-25
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Disclosed aspects and implementations are directed to systems and techniques for protecting cryptographic operations against side-channel attacks. In one example, polynomials associated with secret data and public data defined on a working domain having a first dimension are mapped to an auxiliary domain having a larger second dimension. The mapped polynomials are masked using masking polynomials associated with a kernel of a homomorphism transformation from the auxiliary domain to the working domain. One or more computations are then performed on the masked polynomials in the auxiliary domain and an output is transformed from the auxiliary domain to the working domain.
-
9.
公开(公告)号:US20230093306A1
公开(公告)日:2023-03-23
申请号:US17948017
申请日:2022-09-19
Applicant: Cryptography Research, Inc.
Inventor: Michael Alexander Hamburg , Helena Handschuh , Mark Evan Marson , Winthrop John Wu
IPC: H04L9/06
Abstract: Aspects of the present disclosure involve a method and a system to perform the method to obtain a cryptographic output of a plurality of rounds of a cipher, by performing a plurality of modified rounds of the cipher, each of the modified rounds computing an unmasking transform, an operation of a respective round of the cipher, and a masking transform, the unmasking transform being an inverse of the masking transform of a previous round of the cipher.
-
公开(公告)号:US20220197981A1
公开(公告)日:2022-06-23
申请号:US17553545
申请日:2021-12-16
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
-
-
-
-
-
-
-
-