Patents by Inventor Elke De Mulder

Elke De Mulder has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11914870
    Abstract: Aspects of the present disclosure calculate masked data shares dynamically inside the CPU boundary, and use a plurality of memory channels to write the masked data shares to an external memory location and/or to read the data shares from that external memory location. Each dynamically generated mask value is uniquely associated with a corresponding memory channel during writing data to the external memory. The modified masked data is unmasked or remasked during a subsequent read operation.
    Type: Grant
    Filed: March 4, 2020
    Date of Patent: February 27, 2024
    Assignee: CRYPTOGRAPHY RESEARCH, INC.
    Inventors: Elke De Mulder, Michael Hutter, Samantha Gummalla
  • Patent number: 11743028
    Abstract: Systems and methods for protecting block cipher computation operations, from external monitoring attacks.
    Type: Grant
    Filed: September 1, 2020
    Date of Patent: August 29, 2023
    Assignee: Cryptography Research, Inc.
    Inventors: Jean-Michel Cioranesco, Elena Trichina, Elke De Mulder, Matthew Pond Baker
  • Patent number: 11507659
    Abstract: Embodiments herein facilitate resisting side channel attacks through various implementations and combinations of implementations. In embodiments, this is accomplished by preventing sensitive data from consecutively following other data through potentially vulnerable resources which otherwise may cause data to leak. Where such vulnerabilities to attacks are known, suspected, or as a proactive precaution, a cleaner can be used to inhibit the sensitive data from passing through the vulnerable areas consecutively and thus inhibit the leakage. Embodiments also envision utilizing certain types of circuits to assist in preventing leakage. By using such circuits one can reduce or even potentially eliminate the requirement for cleaners as mentioned previously.
    Type: Grant
    Filed: September 25, 2020
    Date of Patent: November 22, 2022
    Assignee: Cryptography Research, Inc.
    Inventors: Sami Saab, Elke De Mulder, Pankaj Rohatgi, Craig E. Hampel, Jeremy Cooper, Winthrop Wu
  • Patent number: 11463236
    Abstract: An indication of a mode of operation to be performed with a block cipher may be received. Logic associated with the block cipher may be configured based on the indicated mode of operation to be performed with the block cipher. Furthermore, an input data and a mask data may be received. The input data may be combined with the mask data to generate a masked input data based on the configured logic. The masked input data may be provided to the block cipher based on the configured logic and an output data may be generated with the block cipher based on the provided masked input data.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: October 4, 2022
    Assignee: CRYPTOGRAPHY RESEARCH, INC.
    Inventors: Rodrigo Portella do Canto, Elke De Mulder, Pankaj Rohatgi, Matthew Pond Baker
  • Publication number: 20220147251
    Abstract: Aspects of the present disclosure calculate masked data shares dynamically inside the CPU boundary, and use a plurality of memory channels to write the masked data shares to an external memory location and/or to read the data shares from that external memory location. Each dynamically generated mask value is uniquely associated with a corresponding memory channel during writing data to the external memory. The modified masked data is unmasked or remasked during a subsequent read operation.
    Type: Application
    Filed: March 4, 2020
    Publication date: May 12, 2022
    Inventors: Elke De Mulder, Michael Hutter, Samantha Gummalla
  • Patent number: 11303436
    Abstract: Systems and methods for performing cryptographic data processing operations employing non-linear share encoding for protecting from external monitoring attacks. An example method includes: receiving a plurality of shares representing a secret value employed in a cryptographic operation, such that the plurality of shares includes a first share represented by an un-encoded form and a second share represented by an encoded form; producing a transformed form of the second share; and performing the cryptographic operation using the transformed form of the second share.
    Type: Grant
    Filed: June 23, 2017
    Date of Patent: April 12, 2022
    Assignee: CRYPTOGRAPHY RESEARCH, INC.
    Inventor: Elke De Mulder
  • Patent number: 11200348
    Abstract: A side-channel attack resistant circuit topology for performing logic functions. This topology includes combinatorial logic to perform the at least one logic function. A logic input selector alternately supplies, in response to a first timing reference signal, an input to the combinatorial logic with noise generating input values and valid input values. A first latch input selector alternately supplies, in response to the first timing reference signal, a first memory element input with noise generating input values and valid logic output values. The valid logic output values are received from the combinatorial logic. A first memory element latches the valid logic output values in response to a second timing reference signal.
    Type: Grant
    Filed: October 24, 2019
    Date of Patent: December 14, 2021
    Assignee: Cryptography Research, Inc.
    Inventors: Roberto Rivoir, Elke De Mulder, Jean-Michel Cioranesco
  • Patent number: 11101981
    Abstract: Share values for use in a cryptographic operation may be received and the cryptographic operation may be performed based on the share values. A pseudorandom number that is to be used by the cryptographic operation may be identified and the pseudorandom number may be generated based on a portion of the share values that are used in the cryptographic operation. The cryptographic operation may then be performed based on the generated pseudorandom number.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: August 24, 2021
    Assignee: Cryptography Research, Inc.
    Inventors: Pankaj Rohatgi, Elke De Mulder, Michael Hutter
  • Publication number: 20210256165
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation.
    Type: Application
    Filed: February 5, 2021
    Publication date: August 19, 2021
    Inventors: Guilherme Ozari de Almeida, Elena Trichina, Elke De Mulder
  • Publication number: 20210152331
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
    Type: Application
    Filed: November 25, 2020
    Publication date: May 20, 2021
    Inventors: Elena Trichina, Guilherme Ozari de Almeida, Elke De Mulder
  • Publication number: 20210058228
    Abstract: Systems and methods for protecting block cipher computation operations, from external monitoring attacks.
    Type: Application
    Filed: September 1, 2020
    Publication date: February 25, 2021
    Inventors: Jean-Michel Cioranesco, Elena Trichina, Elke De Mulder, Matthew Pond Baker
  • Patent number: 10915667
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation.
    Type: Grant
    Filed: December 13, 2017
    Date of Patent: February 9, 2021
    Assignee: Cryptography Research, Inc.
    Inventors: Guilherme Ozari de Almeida, Elena Trichina, Elke De Mulder
  • Publication number: 20210026956
    Abstract: Embodiments herein facilitate resisting side channel attacks through various implementations and combinations of implementations. In embodiments, this is accomplished by preventing sensitive data from consecutively following other data through potentially vulnerable resources which otherwise may cause data to leak. Where such vulnerabilities to attacks are known, suspected, or as a proactive precaution, a cleaner can be used to inhibit the sensitive data from passing through the vulnerable areas consecutively and thus inhibit the leakage. Embodiments also envision utilizing certain types of circuits to assist in preventing leakage. By using such circuits one can reduce or even potentially eliminate the requirement for cleaners as mentioned previously.
    Type: Application
    Filed: September 25, 2020
    Publication date: January 28, 2021
    Inventors: Sami Saab, Elke De Mulder, Pankaj Rohatgi, Craig E. Hampel, Jeremy Cooper, Winthrop Wu
  • Patent number: 10855443
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
    Type: Grant
    Filed: July 11, 2017
    Date of Patent: December 1, 2020
    Assignee: Cryptography Research Inc.
    Inventors: Elena Trichina, Guilherme Ozari de Almeida, Elke De Mulder
  • Patent number: 10789358
    Abstract: Embodiments herein facilitate resisting side channel attacks through various implementations and combinations of implementations. In embodiments, this is accomplished by preventing sensitive data from consecutively following other data through potentially vulnerable resources which otherwise may cause data to leak. Where such vulnerabilities to attacks are known, suspected, or as a proactive precaution, a cleaner can be used to inhibit the sensitive data from passing through the vulnerable areas consecutively and thus inhibit the leakage. Embodiments also envision utilizing certain types of circuits to assist in preventing leakage. By using such circuits one can reduce or even potentially eliminate the requirement for cleaners as mentioned previously.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: September 29, 2020
    Assignee: CRYPTOGRAPHY RESEARCH, INC.
    Inventors: Sami Saab, Elke De Mulder, Pankaj Rohatgi, Craig E Hampel, Jeremy Cooper, Winthrop Wu
  • Patent number: 10771235
    Abstract: Systems and methods for protecting block cipher computation operations, from external monitoring attacks.
    Type: Grant
    Filed: August 22, 2017
    Date of Patent: September 8, 2020
    Assignee: Cryptography Research Inc.
    Inventors: Jean-Michel Cioranesco, Elena Trichina, Elke De Mulder, Matthew Pond Baker
  • Publication number: 20200175162
    Abstract: Embodiments herein facilitate resisting side channel attacks through various implementations and combinations of implementations. In embodiments, this is accomplished by preventing sensitive data from consecutively following other data through potentially vulnerable resources which otherwise may cause data to leak. Where such vulnerabilities to attacks are known, suspected, or as a proactive precaution, a cleaner can be used to inhibit the sensitive data from passing through the vulnerable areas consecutively and thus inhibit the leakage. Embodiments also envision utilizing certain types of circuits to assist in preventing leakage. By using such circuits one can reduce or even potentially eliminate the requirement for cleaners as mentioned previously.
    Type: Application
    Filed: October 12, 2016
    Publication date: June 4, 2020
    Inventors: Sami James Saab, Elke De Mulder, Pankaj Rohatgi, Craig E. Hampel, Jeremy Cooper, Winthrop Wu
  • Publication number: 20200167505
    Abstract: A side-channel attack resistant circuit topology for performing logic functions. This topology includes combinatorial logic to perform the at least one logic function. A logic input selector alternately supplies, in response to a first timing reference signal, an input to the combinatorial logic with noise generating input values and valid input values. A first latch input selector alternately supplies, in response to the first timing reference signal, a first memory element input with noise generating input values and valid logic output values. The valid logic output values are received from the combinatorial logic. A first memory element latches the valid logic output values in response to a second timing reference signal.
    Type: Application
    Filed: October 24, 2019
    Publication date: May 28, 2020
    Inventors: Roberto RIVOIR, Elke DE MULDER, Jean-Michel CIORANESCO
  • Publication number: 20200026883
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation.
    Type: Application
    Filed: December 13, 2017
    Publication date: January 23, 2020
    Inventors: Guilherme Ozari de Almeida, Elena Trichina, Elke De Mulder
  • Publication number: 20190372757
    Abstract: Share values for use in a cryptographic operation may be received and the cryptographic operation may be performed based on the share values. A pseudorandom number that is to be used by the cryptographic operation may be identified and the pseudorandom number may be generated based on a portion of the share values that are used in the cryptographic operation. The cryptographic operation may then be performed based on the generated pseudorandom number.
    Type: Application
    Filed: June 18, 2019
    Publication date: December 5, 2019
    Inventors: Pankaj Rohatgi, Elke De Mulder, Michael Hutter