-
公开(公告)号:US20240396709A1
公开(公告)日:2024-11-28
申请号:US18670037
申请日:2024-05-21
Applicant: Cryptography Research, Inc.
Inventor: Pascal Sasdrich , Begül Bilgin , Michael Hutter
Abstract: An input data may be received. A portion of a cryptographic operation may be performed with the received input data at a first function component. During the performance of the cryptographic operation at the first function component, a pre-charge operation may be performed at a second function component. Furthermore, the second function component may be used to perform another portion of the cryptographic operation with a result of the portion of the cryptographic operation performed at the first function component.
-
公开(公告)号:US12021969B2
公开(公告)日:2024-06-25
申请号:US17598189
申请日:2020-04-01
Applicant: Cryptography Research, Inc.
Inventor: Pascal Sasdrich , Begül Bilgin , Michael Hutter
CPC classification number: H04L9/0631 , H04L9/003 , H04L2209/04 , H04L2209/125
Abstract: An input data may be received. A portion of a cryptographic operation may be performed with the received input data at a first function component. During the performance of the cryptographic operation at the first function component, a pre-charge operation may be performed at a second function component. Furthermore, the second function component may be used to perform another portion of the cryptographic operation with a result of the portion of the cryptographic operation performed at the first function component.
-
公开(公告)号:US20220191004A1
公开(公告)日:2022-06-16
申请号:US17598189
申请日:2020-04-01
Applicant: Cryptography Research, Inc.
Inventor: Pascal Sasdrich , Begül Bilgin , Michael Hutter
Abstract: An input data may be received. A portion of a cryptographic operation may be performed with the received input data at a first function component. During the performance of the cryptographic operation at the first function component, a pre-charge operation may be performed at a second function component. Furthermore, the second function component may be used to perform another portion of the cryptographic operation with a result of the portion of the cryptographic operation performed at the first function component.
-
-