-
公开(公告)号:US20210286902A1
公开(公告)日:2021-09-16
申请号:US17199279
申请日:2021-03-11
Applicant: STMICROELECTRONICS (ROUSSET) SAS
Inventor: Yanis LINGE , Simon LANDRY
IPC: G06F21/72
Abstract: The present disclosure relates to a method of fault detection in an application, by an electronic circuit, of a first function to a message, including the steps of generating, from the message, a non-zero even number N of different first sets, each including P shares; applying, to the P shares of each first set, one or a plurality of second functions delivering, for each first set, a second set including Q images; and cumulating all the images, starting with at most Q-1 images selected from among the Q images of a same second set.
-
公开(公告)号:US20200313846A1
公开(公告)日:2020-10-01
申请号:US16810434
申请日:2020-03-05
Applicant: STMICROELECTRONICS (ROUSSET) SAS
Inventor: Ibrahima DIOP , Yanis LINGE
Abstract: Cryptographic circuitry, in operation, performs a calculation on a first number and a second number. The performing of the calculation is protected by breaking the second number into a plurality of third numbers, a sum of values of the third numbers being equal to a value of the second number. The calculation is performed bit by bit for each rank of the third numbers. Functional circuitry, coupled to the cryptographic circuitry, uses a result of the calculation.
-
公开(公告)号:US20190268137A1
公开(公告)日:2019-08-29
申请号:US16281881
申请日:2019-02-21
Applicant: STMICROELECTRONICS (ROUSSET) SAS
Inventor: Yanis LINGE , Thomas ORDAS , Pierre-Yvan LIARDET
IPC: H04L9/06
Abstract: The disclosure concerns implementing, by a cryptographic circuit, a set of substitution operations of a cryptographic process involving a plurality of substitution tables. For each set of substitution operations of the cryptographic process, a series of sets of substitution operations are performed. One set of the series is a real set of substitution operations corresponding to the set of substitution operations of the cryptographic process. One or more other sets are dummy sets of substitution operations, each dummy set being based on a different permutation of said substitution tables.
-
公开(公告)号:US20190034629A1
公开(公告)日:2019-01-31
申请号:US16041077
申请日:2018-07-20
Applicant: STMICROELECTRONICS (ROUSSET) SAS
Inventor: Ibrahima DIOP , Yanis LINGE , Pierre-Yvan LIARDET
Abstract: An iterative calculation is performed on a first number and a second number, while protecting the iterative calculation against side-channel attacks. For each bit of the second number, successively, an iterative calculation routine of the bit of the second number is determined. The determination is made independent of a state of the bit. The determined iterative calculation routine of the bit is executed. A result of the iterative calculation is generated based on a result of the execution of the determined iterative calculation routine of a last bit of the second number.
-
5.
公开(公告)号:US20190354728A1
公开(公告)日:2019-11-21
申请号:US16411819
申请日:2019-05-14
Applicant: STMicroelectronics (Rousset) SAS
Inventor: Alexandre SARAFIANOS , Thomas ORDAS , Yanis LINGE , Jimmy FORT
Abstract: The supply voltage for a module of an integrated circuit managed to support protection against side channel attacks. Upon startup of the integrated circuit, one action from the following actions is selected in response to a command: supplying the module with the supply voltage having a fixed value that is selected from a plurality of predetermined values, or varying the value of the supply voltage in time with a pulsed signal.
-
公开(公告)号:US20190268134A1
公开(公告)日:2019-08-29
申请号:US16281887
申请日:2019-02-21
Applicant: STMICROELECTRONICS (ROUSSET) SAS
Inventor: Daniele FRONTE , Yanis LINGE , Thomas ORDAS
Abstract: A cryptographic circuit performs a substitution operation of a cryptographic algorithm based on a scrambled substitution table. For each set of one or more substitution operations of the cryptographic algorithm, the circuit performs a series of sets of one or more substitution operations of which: one is a real set of one or more substitution operations defined by the cryptographic algorithm, the real set of one or more substitution operations being based on input data modified by a real scrambling key; and one or more others are dummy sets of one or more substitution operations, each dummy set of one or more dummy substitution operations being based on input data modified by a different false scrambling key.
-
公开(公告)号:US20220414268A1
公开(公告)日:2022-12-29
申请号:US17850497
申请日:2022-06-27
Applicant: STMICROELECTRONICS (ROUSSET) SAS
Inventor: Simon LANDRY , Yanis LINGE
IPC: G06F21/72
Abstract: The present disclosure relates to a method for protecting a first data item applied to a cryptographic algorithm, executed by a processor, wherein said algorithm is a per-round algorithm, with each round processing contents of first, second and third registers, the content of the second register being masked, during first parity rounds, by the content of a fourth register and the content of the third register being masked, during second parity rounds, by the content of a fifth register.
-
公开(公告)号:US20220085974A1
公开(公告)日:2022-03-17
申请号:US17537056
申请日:2021-11-29
Applicant: STMICROELECTRONICS (ROUSSET) SAS
Inventor: Thomas ORDAS , Yanis LINGE
Abstract: A cryptographic circuit performs a substitution operation of a cryptographic algorithm. For each substitution operation of the cryptographic algorithm, a series of substitution operations are performed by the cryptographic circuit. One of the substitution operations of the series is a real substitution operation corresponding to the substitution operation of the cryptographic algorithm. One or more other substitution operations of the series are dummy substitution operations. A position of the real substitution operation in said series is selected randomly.
-
公开(公告)号:US20190268136A1
公开(公告)日:2019-08-29
申请号:US16281889
申请日:2019-02-21
Applicant: STMICROELECTRONICS (ROUSSET) SAS
Inventor: Thomas ORDAS , Yanis LINGE
Abstract: A cryptographic circuit performs a substitution operation of a cryptographic algorithm. For each substitution operation of the cryptographic algorithm, a series of substitution operations are performed by the cryptographic circuit. One of the substitution operations of the series is a real substitution operation corresponding to the substitution operation of the cryptographic algorithm. One or more other substitution operations of the series are dummy substitution operations. A position of the real substitution operation in said series is selected randomly.
-
-
-
-
-
-
-
-