DIGEST GENERATION
    7.
    发明申请
    DIGEST GENERATION 审中-公开
    最终生成

    公开(公告)号:WO2013066320A1

    公开(公告)日:2013-05-10

    申请号:PCT/US2011/058802

    申请日:2011-11-01

    CPC classification number: G06F17/30303 G06F17/30306 G06F17/3033

    Abstract: In one embodiment, circuitry may generate digests to be combined to produce a hash value. The digests may include at least one digest and at least one other digest generated based at least in part upon at least one CRC value and at least one other CRC value. The circuitry may include cyclical redundancy check (CRC) generator circuitry to generate the at least one CRC value based at least in part upon at least one input string. The CRC generator circuitry also may generate the at least one other CRC value based least in part upon at least one other input string. The at least one other input string resulting at least in part from at least one pseudorandom operation involving, at least in part, the at least one input string. Many modifications, variations, and alternatives are possible without departing from this embodiment.

    Abstract translation: 在一个实施例中,电路可以生成待组合的摘要以产生散列值。 摘要可以至少部分地基于至少一个CRC值和至少一个其它CRC值来生成至少一个摘要和至少一个其他摘要。 电路可以包括循环冗余校验(CRC)发生器电路,以至少部分地基于至少一个输入串来生成至少一个CRC值。 CRC发生器电路还可以至少部分地基于至少一个其他输入串来生成至少一个其它CRC值。 所述至少一个其他输入字符串至少部分地由至少一个涉及至少一个输入字符串的伪随机操作产生。 在不脱离本实施例的情况下,可以进行许多修改,变型和替换。

    INSTRUCTIONS PROCESSORS, METHODS, AND SYSTEMS TO PROCESS SECURE HASH ALGORITHMS
    8.
    发明申请
    INSTRUCTIONS PROCESSORS, METHODS, AND SYSTEMS TO PROCESS SECURE HASH ALGORITHMS 审中-公开
    指令处理器,方法和系统来处理安全的哈希算法

    公开(公告)号:WO2014105135A1

    公开(公告)日:2014-07-03

    申请号:PCT/US2013/046410

    申请日:2013-06-18

    Abstract: A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements a i , b i , e i , and f i for a current round (i) of a secure hash algorithm 2 (SHA2) hash algorithm. The instruction indicates a second source of a second packed data. The first packed data has a width in bits that is less than a combined width in bits of eight state data elements a i , b i , c i , d i , e i , f i , g i , h i of the SHA2 hash algorithm. The method also includes storing a result in a destination indicated by the instruction in response to the instruction. The result includes updated state data elements a i+ , b i+ , e i+ , and f i+ that have been updated from the corresponding state data elements a i , b i , e i , and f i by at least one round of the SHA2 hash algorithm.

    Abstract translation: 方面的方法包括接收指令。 该指令指示包括安全散列算法2(SHA2)散列算法的当前轮(i)的状态数据元素ai,bi,ei和fi的第一打包数据的第一来源。 该指令指示第二打包数据的第二来源。 第一打包数据具有小于SHA2散列算法的八个状态数据元素ai,bi,ci,di,ei,fi,gi,hi的组合宽度的比特宽度。 该方法还包括响应于指令将结果存储在由指令指示的目的地中。 结果包括已经通过至少一轮的SHA2散列算法从相应的状态数据元素ai,bi,ei和fi更新的更新的状态数据元素ai +,bi +,ei +和fi +。

Patent Agency Ranking