Patent | Date |
---|
Establishing and verifying identity using biometrics while protecting user privacy Grant 10,868,672 - Farrugia , et al. December 15, 2 | 2020-12-15 |
Computing key-schedules of the AES for use in white boxes Grant 9,774,443 - Chevallier-Mames , et al. September 26, 2 | 2017-09-26 |
Precomputing internal AES states in counter mode to protect keys used in AES computations Grant 9,716,586 - Chevallier-Mames , et al. July 25, 2 | 2017-07-25 |
Using state reordering to protect against white box attacks Grant 9,692,592 - Kindarji , et al. June 27, 2 | 2017-06-27 |
Protecting software through a fake cryptographic layer Grant 9,639,673 - Betouin , et al. May 2, 2 | 2017-05-02 |
Protecting cryptographic operations using conjugacy class functions Grant 9,565,018 - Farrugia , et al. February 7, 2 | 2017-02-07 |
Using State Reordering To Protect Against White Box Attacks App 20160359618 - Kindarji; Bruno ;   et al. | 2016-12-08 |
Multi-block cryptographic operation Grant 9,515,818 - Kindarji , et al. December 6, 2 | 2016-12-06 |
Computing Key-schedules Of The Aes For Use In White Boxes App 20160261405 - Chevallier-Mames; Benoit ;   et al. | 2016-09-08 |
Precomputing Internal Aes States In Counter Mode To Protect Keys Used In Aes Computations App 20160211972 - Chevallier-Mames; Benoit ;   et al. | 2016-07-21 |
Multi-Block Cryptographic Operation App 20160080143 - Kindarji; Bruno ;   et al. | 2016-03-17 |
Precomputing internal AES states in counter mode to protect keys used in AES computations Grant 9,264,222 - Chevallier-Mames , et al. February 16, 2 | 2016-02-16 |
Protecting Software Through A Fake Cryptographic Layer App 20150363580 - Betouin; Pierre ;   et al. | 2015-12-17 |
Protecting Cryptographic Operations Using Conjugacy Class Functions App 20150349951 - Farrugia; Augustin J. ;   et al. | 2015-12-03 |
Protecting look up tables by mixing code and operations Grant 9,189,425 - Farrugia , et al. November 17, 2 | 2015-11-17 |
Protecting against white box attacks using column rotation Grant 9,143,317 - Chevallier-Mames , et al. September 22, 2 | 2015-09-22 |
Methods and apparatus for correlation protected processing of cryptographic operations Grant 8,976,960 - Ciet , et al. March 10, 2 | 2015-03-10 |
Method of identification or authorization, and associated system and secure module Grant 8,972,727 - Kindarji , et al. March 3, 2 | 2015-03-03 |
Securing the implementation of a cryptographic process using key expansion Grant 8,966,279 - Farrugia , et al. February 24, 2 | 2015-02-24 |
Methods and apparatus for correlation protected processing of data operations Grant 8,918,768 - Chevallier-Mames , et al. December 23, 2 | 2014-12-23 |
Protecting Against White Box Attacks Using Column Rotation App 20140348323 - Chevallier-Mames; Benoit ;   et al. | 2014-11-27 |
Precomputing Internal Aes States In Counter Mode To Protect Keys Used In Aes Computations App 20140301546 - Chevallier-Mames; Benoit ;   et al. | 2014-10-09 |
Methods And Apparatus For Correlation Protected Processing Of Data Operations App 20140165030 - Chevallier-Mames; Benoit ;   et al. | 2014-06-12 |
Identification based on encrypted biometric data Grant 8,700,912 - Kindarji , et al. April 15, 2 | 2014-04-15 |
Multiplicative splits to protect cipher keys Grant 8,675,866 - Farrugia , et al. March 18, 2 | 2014-03-18 |
Method and apparatus for obfuscating program source codes Grant 8,661,549 - Chevallier-Mames , et al. February 25, 2 | 2014-02-25 |
Cryptographic process execution protecting an input value against attacks Grant 8,605,894 - Farrugia , et al. December 10, 2 | 2013-12-10 |
Methods And Apparatus For Correlation Protected Processing Of Cryptographic Operations App 20130259226 - Ciet; Mathieu ;   et al. | 2013-10-03 |
Method And Apparatus For Obfuscating Program Source Codes App 20130232578 - Chevallier-Mames; Benoit ;   et al. | 2013-09-05 |
Securing Implementation Of Cryptographic Algorithms Using Additional Rounds App 20130067212 - FARRUGIA; Augustin J. ;   et al. | 2013-03-14 |
Protecting Look Up Tables By Mixing Code And Operations App 20130061061 - FARRUGIA; Augustin J. ;   et al. | 2013-03-07 |
Cryptographic Process Execution Protecting An Input Value Against Attacks App 20130016836 - FARRUGIA; Augustin J. ;   et al. | 2013-01-17 |
Multiplicative Splits To Protect Cipher Keys App 20130010963 - FARRUGIA; Augustin J. ;   et al. | 2013-01-10 |
Securing The Implementation Of A Cryptographic Process Using Key Expansion App 20120159186 - FARRUGIA; Augustin J. ;   et al. | 2012-06-21 |
Method of Identification or Authorization, and Associated System and Secure Module App 20110231667 - Kindarji; Bruno ;   et al. | 2011-09-22 |
Identification Based on Encrypted Biometric Data App 20100281269 - Kindarji; Bruno ;   et al. | 2010-11-04 |