Patents by Inventor Elena Trichina

Elena Trichina has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11743028
    Abstract: Systems and methods for protecting block cipher computation operations, from external monitoring attacks.
    Type: Grant
    Filed: September 1, 2020
    Date of Patent: August 29, 2023
    Assignee: Cryptography Research, Inc.
    Inventors: Jean-Michel Cioranesco, Elena Trichina, Elke De Mulder, Matthew Pond Baker
  • Publication number: 20230004965
    Abstract: The invention relates to an electronic transaction method for a system comprising a user-associated payment device 3 or 4 and a payment terminal 1. The payment device 3 or 4 and the payment terminal 1 perform a cryptographic key exchange 500 before performing a transaction step 501. The payment device includes personal information PI about the user. The payment terminal includes a transaction policy including a condition relative to the personal information Pi. The method includes a verification step 510, 520, 530, prior to the transaction step 501, for securely verifying the condition of the transaction policy relative to the personal information using the cryptographic key.
    Type: Application
    Filed: December 11, 2020
    Publication date: January 5, 2023
    Inventors: David NACCACHE, Michel LEGER, Elena TRICHINA
  • Publication number: 20220391870
    Abstract: A payment system including an electronic cash register associated with a physical point of sale of a merchant; and a payment acquisition device for advantageously cooperating with a payment issuing device of a client via a first link. Such a payment acquisition device transmits payment transaction messages (MSGT) to a bank server via a second link in order to implement electronic payment transactions. The payment acquisition device is configured to include a mechanism for capturing a view of any invoice issued by an electronic cash register, and the processing unit of such a payment acquisition device is configured to trigger the capture of at least one digital representation of the invoice and to automatically detect and determine therefrom the payment amount of the relevant financial transaction.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 8, 2022
    Inventors: David NACCACHE, Pavel POLECHTCHOUCK, Elena TRICHINA
  • Publication number: 20210256165
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation.
    Type: Application
    Filed: February 5, 2021
    Publication date: August 19, 2021
    Inventors: Guilherme Ozari de Almeida, Elena Trichina, Elke De Mulder
  • Patent number: 11018849
    Abstract: An integrated circuit may implement a masked substitution box that includes substitution function components, a decoder, and a logic component. Each of the substitution function components may receive a same input value and a different mask value and may generate a respective output mask value based on the same input value and respective different mask value The decoder may receive an input mask value and generate a decoded output value that is based on the received input mask value. The logic component may select one of the output mask values from one of the substitution function components based on the decoded output value.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: May 25, 2021
    Assignee: CRYPTOGRAPHY RESEARCH, INC.
    Inventors: Matthew Pond Baker, Elena Trichina, Jean-Michel Cioranesco, Michael Hutter
  • Publication number: 20210152331
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
    Type: Application
    Filed: November 25, 2020
    Publication date: May 20, 2021
    Inventors: Elena Trichina, Guilherme Ozari de Almeida, Elke De Mulder
  • Publication number: 20210058228
    Abstract: Systems and methods for protecting block cipher computation operations, from external monitoring attacks.
    Type: Application
    Filed: September 1, 2020
    Publication date: February 25, 2021
    Inventors: Jean-Michel Cioranesco, Elena Trichina, Elke De Mulder, Matthew Pond Baker
  • Patent number: 10915667
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation.
    Type: Grant
    Filed: December 13, 2017
    Date of Patent: February 9, 2021
    Assignee: Cryptography Research, Inc.
    Inventors: Guilherme Ozari de Almeida, Elena Trichina, Elke De Mulder
  • Patent number: 10855443
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
    Type: Grant
    Filed: July 11, 2017
    Date of Patent: December 1, 2020
    Assignee: Cryptography Research Inc.
    Inventors: Elena Trichina, Guilherme Ozari de Almeida, Elke De Mulder
  • Patent number: 10771235
    Abstract: Systems and methods for protecting block cipher computation operations, from external monitoring attacks.
    Type: Grant
    Filed: August 22, 2017
    Date of Patent: September 8, 2020
    Assignee: Cryptography Research Inc.
    Inventors: Jean-Michel Cioranesco, Elena Trichina, Elke De Mulder, Matthew Pond Baker
  • Publication number: 20200067695
    Abstract: An integrated circuit may implement a masked substitution box that includes substitution function components, a decoder, and a logic component. Each of the substitution function components may receive a same input value and a different mask value and may generate a respective output mask value based on the same input value and respective different mask value The decoder may receive an input mask value and generate a decoded output value that is based on the received input mask value. The logic component may select one of the output mask values from one of the substitution function components based on the decoded output value.
    Type: Application
    Filed: October 28, 2019
    Publication date: February 27, 2020
    Inventors: Matthew Pond Baker, Elena Trichina, Jean-Michel Cioranesco, Michael Hutter
  • Publication number: 20200026883
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation.
    Type: Application
    Filed: December 13, 2017
    Publication date: January 23, 2020
    Inventors: Guilherme Ozari de Almeida, Elena Trichina, Elke De Mulder
  • Patent number: 10461925
    Abstract: An integrated circuit may implement a masked substitution box that includes a counter that generates counter values. An input mask component may generate unmasked input values based on a combination of respective counter values and an input mask value. Furthermore, a substitution function component may receive the unmasked input values and may generate output values based on respective unmasked input values and a substitution function. An output mask component may generate masked output values based on a combination of respective output values and an output mask value. The masked output values may be stored at memory elements.
    Type: Grant
    Filed: August 9, 2017
    Date of Patent: October 29, 2019
    Assignee: Cryptography Research, Inc.
    Inventors: Matthew Pond Baker, Elena Trichina, Jean-Michel Cioranesco, Michael Hutter
  • Publication number: 20180062830
    Abstract: An integrated circuit may implement a masked substitution box that includes a counter that generates counter values. An input mask component may generate unmasked input values based on a combination of respective counter values and an input mask value. Furthermore, a substitution function component may receive the unmasked input values and may generate output values based on respective unmasked input values and a substitution function. An output mask component may generate masked output values based on a combination of respective output values and an output mask value. The masked output values may be stored at memory elements.
    Type: Application
    Filed: August 9, 2017
    Publication date: March 1, 2018
    Inventors: Matthew Pond Baker, Elena Trichina, Jean-Michel Cioranesco, Michael Hutter
  • Publication number: 20180062828
    Abstract: Systems and methods for protecting block cipher computation operations, from external monitoring attacks.
    Type: Application
    Filed: August 22, 2017
    Publication date: March 1, 2018
    Inventors: Jean-Michel Cioranesco, Elena Trichina, Elke De Mulder, Matthew Pond Baker
  • Publication number: 20180034628
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
    Type: Application
    Filed: July 11, 2017
    Publication date: February 1, 2018
    Inventors: Elena Trichina, Guilherme Ozari de Almeida, Elke De Mulder
  • Patent number: 8670557
    Abstract: Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates securing data associated with messages in accordance with a cryptographic protocol. The cryptographic component includes a randomized exponentiation component that facilitates decryption of data and generation of digital signatures by exponentiating exponents associated with messages. An exponent is divided into more than one subexponent at an exponent bit that corresponds to a random number. Exponentiation of the first subexponent can be performed based on a left-to-right-type of exponentiation algorithm, and exponentiation of the second subexponent can be performed based on a right-to-left square-and-multiply-type of exponentiation algorithm. The final value is based on the exponentiations of the subexponents and can be decrypted data or a digital signature, which can be provided as an output.
    Type: Grant
    Filed: September 10, 2007
    Date of Patent: March 11, 2014
    Assignee: Spansion LLC
    Inventors: Elena Trichina, Helena Handschuh, Arnaud Boscher
  • Patent number: 8650399
    Abstract: Systems, devices and/or methods that facilitate mutual authentication for processor and memory pairing are presented. A processor and a suitably equipped memory can be provided with a shared secret to facilitate mutual authentication. In addition, the memory can be configured to verify that the system operating instructions have not been subjected to unauthorized alterations. System integrity can be ensured according to the disclosed subject matter by mutual authentication of the processor and memory and verification of the authenticity of system operating instructions at or near each system power up. As a result, the disclosed subject matter can facilitate relatively low complexity assurance of system integrity as a replacement or supplement to conventional techniques.
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: February 11, 2014
    Assignee: Spansion LLC
    Inventors: Joël Le Bihan, Christophe Carvounas, Vincent Cedric Colnot, Elena Trichina, Helena Handschuh
  • Patent number: 8489897
    Abstract: A method of detecting a fault attack during a cryptographic operation using at least one look-up table including a plurality of sub-tables each having a same number of values of a fixed bit length, a fixed relation existing between values at same locations in each sub-table, the method including: performing a load operation to retrieve from the look-up table data values from a same location in each sub-table; verifying that the fixed relation exists between at least two of the data values; and generating an output signal based on the verification.
    Type: Grant
    Filed: March 10, 2011
    Date of Patent: July 16, 2013
    Assignee: STMicroelectronics (Rousset) SAS
    Inventor: Elena Trichina
  • Patent number: 8370644
    Abstract: Systems and methods that facilitate securing data associated with a memory from security breaches are presented. A memory component includes nonvolatile memory, and a secure memory component (e.g., volatile memory) used to store information such as secret information related to secret processes or functions (e.g., cryptographic functions). A security component detects security-related events, such as security breaches or completion of security processes or functions, associated with the memory component and in response to a security-related event, the security component can transmit a reset signal to the secure memory component to facilitate efficiently erasing or resetting desired storage locations in the secure memory component in parallel and in a single clock cycle to facilitate data security. A random number generator component can facilitate generating random numbers after a reset based on a change in scrambler keys used by a scrambler component to descramble data read from the reset storage locations.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: February 5, 2013
    Assignee: Spansion LLC
    Inventors: Helena Handschuh, Arnaud Boscher, Elena Trichina, Joël Le Bihan, Nicolas Prawitz, Frederic Cherpantier, Jimmy Lau