会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • High-performance adder
    • 高性能加法器
    • US07188134B2
    • 2007-03-06
    • US09967240
    • 2001-09-28
    • Sanu K. MathewRam K. Krishnamurthy
    • Sanu K. MathewRam K. Krishnamurthy
    • G06F7/50
    • G06F7/506G06F7/507
    • An adder for use in summing two binary numbers in an arithmetic logic unit of a processor. The adder includes a sparse carry-merge circuit adapted to generate a first predetermined number of carries and a plurality of intermediate carry generators coupled to the sparse carry merge circuit and adapted to generate a second predetermined number of carry signals. The adder further includes a plurality of conditional sum generators coupled to the intermediate carry generators and to the sparse carry-merge circuit to provide the sum of the two binary numbers. The adder may also include a multiplexer recovery circuit that enables a single rail dynamic implementation of the adder core.
    • 一种加法器,用于对处理器的算术逻辑单元中的两个二进制数进行求和。 加法器包括适于生成第一预定数量的进位的稀疏进位合并电路和耦合到稀疏进位合并电路并适于产生第二预定数量进位信号的多个中间进位发生器。 加法器还包括耦合到中间进位发生器和稀疏进位合并电路的多个条件和发生器,以提供两个二进制数的和。 加法器还可以包括多路复用器恢复电路,其实现加法器核的单轨动态实现。
    • 16. 发明申请
    • HARDWARE-EMBEDDED KEY BASED ON RANDOM VARIATIONS OF A STRESS-HARDENED INEGRATED CIRCUIT
    • 基于应力硬化电路的随机变化的硬件嵌入式键
    • US20140266297A1
    • 2014-09-18
    • US13889849
    • 2013-05-08
    • Sanu K. MathewRachael J. ParkerRam K. Krishnamurthy
    • Sanu K. MathewRachael J. ParkerRam K. Krishnamurthy
    • H03K19/003
    • H03K19/00369H03K19/00315
    • An IC cell designed to assert one of multiple possible output states, each with equal probability, implemented to assert a pre-determined one of the multiple output states based on random variations within the IC cell, such as random process variations. An array of IC cells is configurable to provide a hardware-embedded key upon power-up that is unique to the combination of random variations of selected IC cells, resistant to tampering prior to and during manufacture, and tolerant to aging, instantaneous thermal noise, and environmental variations, such as voltage and temperature fluctuations. The key may be used as, without limitation, a Platform Root Key, a High-Bandwidth Digital Content Protection (HDCP) key, an Enhanced Privacy Identification (EPID) key, and/or an Advanced Access Content System (AACS) key. Also disclosed are techniques to measure stability and stress-harden an IC cell based on output states of the IC cell.
    • 被设计成用于断言多个可能的输出状态之一(每个具有相等的概率)的IC单元被实现为基于IC单元内的随机变化来断言多个输出状态中的预定的一个,例如随机过程变化。 IC单元阵列可配置为在上电时提供硬件嵌入式密钥,该特征是选择的IC单元的随机变化的组合,在制造之前和之后都能够防止篡改,并且能够耐老化,瞬时热噪声, 和环境变化,如电压和温度波动。 该密钥可以用作但不限于平台根密钥,高带宽数字内容保护(HDCP)密钥,增强型隐私标识(EPID)密钥和/或高级访问内​​容系统(AACS)密钥)。 还公开了基于IC电池的输出状态来测量IC电池的稳定性和应力硬化的技术。
    • 19. 发明授权
    • Method and apparatus for efficiently implementing the advanced encryption standard
    • 有效实施高级加密标准的方法和装置
    • US08923510B2
    • 2014-12-30
    • US11966658
    • 2007-12-28
    • Shay GueronMichael E. KounavisRam KrishnamurthySanu K. Mathew
    • Shay GueronMichael E. KounavisRam KrishnamurthySanu K. Mathew
    • H04L9/00G06F7/00
    • H04L9/0631G06F7/00G06F9/30007G06F9/30112G06F9/30145G06F9/30149G06F9/30196G06F9/3887G06F21/602H04L2209/34
    • Implementations of Advanced Encryption Standard (AES) encryption and decryption processes are disclosed. In one embodiment of S-box processing, a block of 16 byte values is converted, each byte value being converted from a polynomial representation in GF(256) to a polynomial representation in GF((22)4). Multiplicative inverse polynomial representations in GF((22)4) are computed for each of the corresponding polynomial representations in GF((22)4). Finally corresponding multiplicative inverse polynomial representations in GF((22)4) are converted and an affine transformation is applied to generate corresponding polynomial representations in GF(256). In an alternative embodiment of S-box processing, powers of the polynomial representations are computed and multiplied together in GF(256) to generate multiplicative inverse polynomial representations in GF(256). In an embodiment of inverse-columns-mixing, the 16 byte values are converted from a polynomial representation in GF(256) to a polynomial representation in GF((24)2). A four-by-four matrix is applied to the transformed polynomial representation in GF((24)2) to implement the inverse-columns-mixing.
    • 公开了高级加密标准(AES)加密和解密过程的实现。 在S盒处理的一个实施例中,转换16字节值的块,每个字节值从GF(256)中的多项式表示转换为GF((22)4)中的多项式表示。 对于GF((22)4)中的每个对应多项式表示,计算GF((22)4)中的乘法逆多项式表示。 最后,对GF((22)4)中的相应的乘法逆多项式表示进行转换,并应用仿射变换以在GF(256)中生成对应的多项式表示。 在S盒处理的替代实施例中,计算多项式表示的幂并在GF(256)中相乘,以在GF(256)中生成乘法逆多项式表示。 在反列混合的实施例中,将16字节值从GF(256)中的多项式表示转换为GF((24)2)中的多项式表示。 将四乘四矩阵应用于GF((24)2)中的变换多项式表示,以实现反列混合。
    • 20. 发明申请
    • METHOD AND APPARATUS FOR EFFICIENTLY IMPLEMENTING THE ADVANCED ENCRYPTION STANDARD
    • 有效执行高级加密标准的方法和设备
    • US20090172068A1
    • 2009-07-02
    • US11966658
    • 2007-12-28
    • MICHAEL E. KOUNAVISShay GueronRam KrishnamurthySanu K. Mathew
    • MICHAEL E. KOUNAVISShay GueronRam KrishnamurthySanu K. Mathew
    • G06F7/38
    • H04L9/0631G06F7/00G06F9/30007G06F9/30112G06F9/30145G06F9/30149G06F9/30196G06F9/3887G06F21/602H04L2209/34
    • Implementations of Advanced Encryption Standard (AES) encryption and decryption processes are disclosed. In one embodiment of S-box processing, a block of 16 byte values is converted, each byte value being converted from a polynomial representation in GF(256) to a polynomial representation in GF((22)4). Multiplicative inverse polynomial representations in GF((22)4) are computed for each of the corresponding polynomial representations in GF((22)4). Finally corresponding multiplicative inverse polynomial representations in GF((22)4) are converted and an affine transformation is applied to generate corresponding polynomial representations in GF(256). In an alternative embodiment of S-box processing, powers of the polynomial representations are computed and multiplied together in GF(256) to generate multiplicative inverse polynomial representations in GF(256). In an embodiment of inverse-columns-mixing, the 16 byte values are converted from a polynomial representation in GF(256) to a polynomial representation in GF((24)2). A four-by-four matrix is applied to the transformed polynomial representation in GF((24)2) to implement the inverse-columns-mixing.
    • 公开了高级加密标准(AES)加密和解密过程的实现。 在S盒处理的一个实施例中,转换16字节值的块,每个字节值从GF(256)中的多项式表示转换为GF((22)4)中的多项式表示。 对于GF((22)4)中的每个对应多项式表示,计算GF((22)4)中的乘法逆多项式表示。 最后,对GF((22)4)中的相应的乘法逆多项式表示进行转换,并应用仿射变换以在GF(256)中生成对应的多项式表示。 在S盒处理的替代实施例中,计算多项式表示的幂并在GF(256)中相乘,以在GF(256)中生成乘法逆多项式表示。 在反列混合的实施例中,将16字节值从GF(256)中的多项式表示转换为GF((24)2)中的多项式表示。 将四乘四矩阵应用于GF((24)2)中的变换多项式表示,以实现反列混合。