会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 33. 发明申请
    • COMBINING INSTRUCTIONS INCLUDING AN INSTRUCTION THAT PERFORMS A SEQUENCE OF TRANSFORMATIONS TO ISOLATE ONE TRANSFORMATION
    • 组合指令,包括执行转换序列以隔离一次转换的指令
    • US20090220071A1
    • 2009-09-03
    • US12040214
    • 2008-02-29
    • Shay GueronZeev Sperber
    • Shay GueronZeev Sperber
    • H04L9/28
    • H04L9/0681G06F9/30007G06F21/75G06F2221/2107G09C1/00H04L9/0631H04L2209/125H04L2209/24
    • The Advanced Encryption Standard (AES) is a symmetric block cipher that can encrypt and decrypt information. Encryption (cipher) performs a series of transformations (Shift Rows, Substitute Bytes, Mix Columns) using the secret key (cipher key) to transforms intelligible data referred to as “plaintext” into an unintelligible form referred to as “cipher text”. The transformations (Inverse Shift Rows, Inverse Substitute Bytes, Inverse Mix Columns) in the inverse cipher (decryption) are the inverse of the transformations in the cipher. Encryption and decryption is performed efficiently through the use of instructions that perform the series of transformations. Combinations of these instructions allow the isolation of the transformations (Shift Rows, Substitute Bytes, Mix Columns, Inverse Shift Rows, Inverse Substitute Bytes, Inverse Mix Columns) to be obtained.
    • 高级加密标准(AES)是可以加密和解密信息的对称块密码。 加密(密码)使用秘密密钥(密码密钥)执行一系列转换(Shift Rows,Substitute Bytes,Mix Columns),将被称为“明文”的可理解数据转换成称为“密文”的无法理解的形式。 反密码(解密)中的变换(逆位排,逆替换字节,反混合列)是密码中的变换的逆。 通过使用执行一系列转换的指令来有效地执行加密和解密。 这些指令的组合允许要获得的转换的隔离(Shift Rows,Substitution Bytes,Mix Columns,Inverse Shift Rows,Inverse Substitute Bytes,Inverse Mix Columns)。
    • 34. 发明申请
    • Obscuring Memory Access Patterns in Conjunction with Deadlock Detection or Avoidance
    • 阻止内存访问模式与死锁检测或避免相关联
    • US20090172304A1
    • 2009-07-02
    • US11966794
    • 2007-12-28
    • Shay GueronGad SheafferShlomo Raikin
    • Shay GueronGad SheafferShlomo Raikin
    • G06F12/00
    • G06F12/0808G06F12/0802G06F21/556G06F2201/885G06F2212/1052H04L9/003
    • Methods, apparatus and systems for memory access obscuration are provided. A first embodiment provides memory access obscuration in conjunction with deadlock avoidance. Such embodiment utilizes processor features including an instruction to enable monitoring of specified cache lines and an instruction that sets a status bit responsive to any foreign access (e.g., write or eviction due to a read) to the specified lines. A second embodiment provides memory access obscuration in conjunction with deadlock detection. Such embodiment utilizes the monitoring feature, as well as handler registration. A user-level handler may be asynchronously invoked responsive to a foreign write to any of the specified lines. Invocation of the handler more frequently than expected indicates that a deadlock may have been encountered. In such case, a deadlock policy may be enforced. Other embodiments are also described and claimed.
    • 提供了存储器访问遮蔽的方法,装置和系统。 第一实施例提供结合死锁避免的存储器访问遮蔽。 这种实施例利用处理器特征,包括能够监视指定的高速缓存行的指令,以及响应于指定行的任何外部访问(例如,由于读取的写入或驱逐)而设置状态位的指令。 第二实施例提供结合死锁检测的存储器访问遮蔽。 这种实施例利用监视特征以及处理程序注册。 响应于对任何指定行的外部写入,可以异步调用用户级处理程序。 调用处理程序比预期更频繁表示可能遇到死锁。 在这种情况下,可能会执行死锁策略。 还描述和要求保护其他实施例。
    • 38. 发明申请
    • RSA signature authentication with reduced computational burden
    • RSA签名认证减少计算负担
    • US20080080707A1
    • 2008-04-03
    • US11540213
    • 2006-09-29
    • Shay Gueron
    • Shay Gueron
    • H04L9/30
    • H04L9/302H04L9/3249H04L2209/20
    • Methods and apparatuses enable quick authentication of a Rivest, Shamir, and Adleman (RSA) compliant signature by performing non-modular arithmetic operations on one or more pre-computed constants in place of at least one modular arithmetic operation. In one embodiment, the signature is authenticated by computing SE (mod N) by performing k non-modular arithmetic squaring operations, k+1 non-modular arithmetic subtraction operations, k+2 non-modular arithmetic multiplication operations, and no modular arithmetic, where S is the RSA compliant signature, E is the exponent of a public key, N is the modulus of the public key, and k is a positive integer where E=2k+1.
    • 方法和装置可以通过对一个或多个预先计算的常数执行非模数运算代替至少一个模算法运算来快速认证符合Rivest,Shamir和Adleman(RSA)的签名。 在一个实施例中,通过执行k个非模数算术平方运算,k + 1个非模运算减法运算,k + 2个非模运算,通过计算S(E N) 乘法运算,没有模数运算,其中S是符合RSA的签名,E是公钥的指数,N是公钥的模数,k是正整数,其中E = 2K < SUP> +1。
    • 40. 发明申请
    • Method and a system for a quick verification rabin signature scheme
    • 用于快速验证rabin签名方案的方法和系统
    • US20080002825A1
    • 2008-01-03
    • US11479100
    • 2006-06-30
    • Shay GueronVinodh Gopal
    • Shay GueronVinodh Gopal
    • H04L9/30
    • H04L9/302H04L9/3249
    • A method and a system to perform a Quick Verification of a Rabin Signature (QVRS) is provided. In one embodiment, the signing party generates a Rabin signature S of an original message M using a public key N in the Rabin signature generating formula M=S2 mod N. In one embodiment, the signing party also generates a value q according to the formula q=floor(S2/N). In one embodiment, the signing party sends the original message M, the signature S, the public key N and the value q to the verifying party. In one embodiment, the verifying party verifies the integrity of the message M using the signature S, the public key N and the value q and the test equation M=S2−qN.
    • 提供了一种执行拉宾签名快速验证(QVRS)的方法和系统。 在一个实施例中,签名方使用Rabin签名生成公式M = S&lt; 2&gt; mod N中的公共密钥N来生成原始消息M的拉宾签名S.在一个实施例中,签约方也 根据公式q = floor(S 2 / N)生成值q。 在一个实施例中,签名方向验证方发送原始消息M,签名S,公钥N和值q。 在一个实施例中,验证方使用签名S,公开密钥N和值q以及测试方程M = S 2 -Q N验证消息M的完整性。