会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 53. 发明授权
    • Modular exponentiation with partitioned and scattered storage of Montgomery Multiplication results
    • 使用蒙哥马利乘法结果的分区和分散存储进行模块化取幂
    • US08799343B2
    • 2014-08-05
    • US13241137
    • 2011-09-22
    • Shay GueronVlad Krasnov
    • Shay GueronVlad Krasnov
    • G06F7/38
    • G06F7/723G06F7/728G06F2207/7257
    • Embodiments of techniques and systems for side-channel-protected modular exponentiation are described. In embodiments, during a modular exponentiation calculation, Montgomery Multiplication (“MM”) results are produced. These MM results are scattered through a table for storage, such that storage of the values may not lead to discovery of a secret exponent value by a spy process through a side-channel attack. The scattering may be performed in order to reduce a number of per-result memory operations performed during each MM result storage or retrieval. In embodiments, a window size of 4 may be used in the modular exponentiation, along with partitioning of the MM result into 32-bit partition values which are scattered with offsets of 64-bytes. In embodiments, while use of a window size of 4 may result in additional MM calculations during modular exponentiation than other window sizes, the reduction in memory operations may provide a positive performance offset.
    • 描述了用于侧信道保护的模幂运算的技术和系统的实施例。 在实施例中,在模幂乘计算期间,产生蒙哥马利乘法(“MM”)结果。 这些MM结果分散在一个表中用于存储,这样,存储值可能不会导致间谍进程通过侧信道攻击发现秘密指数值。 可以执行散射以便减少在每个MM结果存储或检索期间执行的每结果存储器操作的数量。 在实施例中,可以在模幂运算中使用4的窗口大小,以及将MM结果划分为以64字节的偏移散布的32位分区值。 在实施例中,尽管窗口大小为4的使用可能导致在模幂运算期间的额外的MM计算,而不是其他窗口大小,但存储器操作的减少可以提供正的性能偏移。
    • 60. 发明申请
    • Methods And Apparatus For Authenticating Components Of Processing Systems
    • 用于认证加工系统部件的方法和装置
    • US20120265998A1
    • 2012-10-18
    • US13532334
    • 2012-06-25
    • Mohan J. KumarShay Gueron
    • Mohan J. KumarShay Gueron
    • G06F21/00
    • G06F21/57G06F21/575G06F2221/2129
    • When a processing system boots, it may retrieve an encrypted version of a cryptographic key from nonvolatile memory to a processing unit, which may decrypt the cryptographic key. The processing system may also retrieve a predetermined authentication code for software of the processing system, and the processing system may use the cryptographic key to compute a current authentication code for the software. The processing system may then determine whether the software should be trusted, by comparing the predetermined authentication code with the current authentication code. In various embodiments, the processing unit may use a key stored in nonvolatile storage of the processing unit to decrypt the encrypted version of the cryptographic key, a hashed message authentication code (HMAC) may be used as the authentication code, and/or the software to be authenticated may be boot firmware, a virtual machine monitor (VMM), or other software. Other embodiments are described and claimed.
    • 当处理系统引导时,它可以从非易失性存储器检索加密密钥的加密版本到处理单元,该处理单元可以解密密码密钥。 处理系统还可以检索用于处理系统的软件的预定认证码,并且处理系统可以使用密码密钥来计算软件的当前认证码。 然后,处理系统可以通过将预定认证码与当前认证码进行比较来确定软件是否应该被信任。 在各种实施例中,处理单元可以使用存储在处理单元的非易失性存储器中的密钥对加密密钥的加密版本进行解密,散列消息认证码(HMAC)可以用作认证码,和/或软件 被认证可以是启动固件,虚拟机监视器(VMM)或其他软件。 描述和要求保护其他实施例。