Patents by Inventor Steven Cooreman

Steven Cooreman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12034831
    Abstract: A system and method of performing an AES encryption, while also determining whether a potentially successful DFA attack is underway is disclosed. When interim results are not visible, the DFA attack that is most likely to be succeed is initiated by introducing the fault between the MixColumns operation in the second to last round and the MixColumns operation in the next to last round. To detect this, the present system and method performs the next to last round and then repeats this next to last round. The results of the original round and repeated round are compared to identify a possible DFA attack. Importantly, the same hardware is used for the original round and the repeated round. In this way, the amount of additional hardware needed to detect a possibly successful DFA attack is minimized. Further, the impact on execution time may be 10% or less.
    Type: Grant
    Filed: June 21, 2022
    Date of Patent: July 9, 2024
    Assignee: Silicon Laboratories Inc.
    Inventor: Steven Cooreman
  • Publication number: 20240187402
    Abstract: A system and method for performing execute-in-place is disclosed, wherein the code is encrypted using AES-GCM and stored in an external memory device. The system includes only one cipher function that is used to encrypt the three counter values that are used to decrypted the encrypted code and to validate the Message Authentication Code (MAC). In some embodiments, the system precalculates a hash subkey so that generation of the Counter 0 value can begin as soon as a valid memory address is available. In addition, the cipher function is modified to utilized two or more cipher generation circuits and only one key expansion circuit. This improves the speed of the operation without a complete duplication of the cipher function hardware. In another embodiment, the cipher function is unrolled so that two or more rounds of key expansion and cipher generation are performed each clock cycle.
    Type: Application
    Filed: December 5, 2022
    Publication date: June 6, 2024
    Inventors: Heng Wee Cheng, Joshua Norem, Steven Cooreman, Phil Matthews
  • Publication number: 20240160752
    Abstract: An apparatus includes an encryption circuit. The encryption circuit includes a block function circuit to generate a plurality of blocks of output data. A first part of a keystream is generated from a block of output data having an initial sequence number. A second part of the keystream is generated from blocks of output having sequence numbers other than the initial sequence number.
    Type: Application
    Filed: November 16, 2022
    Publication date: May 16, 2024
    Inventor: Steven Cooreman
  • Publication number: 20240163077
    Abstract: An apparatus includes an encryption circuit. The encryption circuit includes a block function circuit to generate a plurality of blocks of output data. A block of output data having an initial sequence number includes more state than used by a ChaCha20 block function. A first part of a keystream is generated from a block of output data having the initial sequence number. A second part of the keystream is generated from blocks of output having sequence numbers other than the initial sequence number.
    Type: Application
    Filed: November 16, 2022
    Publication date: May 16, 2024
    Inventor: Steven Cooreman
  • Publication number: 20230412356
    Abstract: A system and method of performing an AES encryption, while also determining whether a potentially successful DFA attack is underway is disclosed. When interim results are not visible, the DFA attack that is most likely to be succeed is initiated by introducing the fault between the MixColumns operation in the second to last round and the MixColumns operation in the next to last round. To detect this, the present system and method performs the next to last round and then repeats this next to last round. The results of the original round and repeated round are compared to identify a possible DFA attack. Importantly, the same hardware is used for the original round and the repeated round. In this way, the amount of additional hardware needed to detect a possibly successful DFA attack is minimized. Further, the impact on execution time may be 10% or less.
    Type: Application
    Filed: June 21, 2022
    Publication date: December 21, 2023
    Inventor: Steven Cooreman
  • Publication number: 20070275868
    Abstract: A liquid detergent composition having alkoxylated polyethyleneimine polymer and alkyl or hydroxyalkyl sulphate or sulphonate surfactants to provide improved grease cleaning.
    Type: Application
    Filed: May 22, 2007
    Publication date: November 29, 2007
    Inventors: Steven Cooremans, Dieter Boeckh, Arturo Casado-Dominquez, Christian Bittner, Andrea Misske
  • Publication number: 20060240557
    Abstract: A method for testing cleaning effect of a compound or compositions is disclosed. The method comprises: (a) Preparing a liquid sample of less than 10 ml comprising the test compound, (b) applying liquid sample to a stained surface, (c) applying mechanical stress to the stained surface by contacting it with a body present in the liquid sample, (d) evaluating the cleaning effect of applying solution and mechanical stress on the stained surface.
    Type: Application
    Filed: June 26, 2006
    Publication date: October 26, 2006
    Applicant: Novozymes A/S
    Inventors: Steven Cooremans, Georg Bechmann, Michael Godskesen, Soren Kjaerulff