$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for masking modulo exponentiation calculations in an integrated circuit 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0969144 (1997-11-12)
발명자 / 주소
  • Curiger Andreas
  • Little Wendell
대리인 / 주소
    Jenkens & Gilchrist
인용정보 피인용 횟수 : 61  인용 특허 : 12

초록

Circuitry which performs modular mathematics to solve the equation C=M.sup.k mod n and n is performed in a manner to mask the exponent k's signature from timing or power monitoring attacks. The modular exponentation function is performed in a normalized manner such that binary ones and zeros in the

대표청구항

[ What is claimed is:] [1.] An integrated circuit containing circuitry for performing modulo exponentiation, said integrated circuit comprising:a modulo exponentiation calculation circuit;a mode data, said mode data indicating whether said modulo exponentiation calculation circuit should operate in

이 특허에 인용된 특허 (12)

  1. Kobayashi Yoshinao,JPX ; Satoh Akashi,JPX ; Niijima Hideto,JPX, Apparatus and method for calculating B.sup.c (mod n).
  2. Kessels Jozef L. W. (Eindhoven NLX), Arithmetic unit for multiplying long integers modulo M and R.S.A. converter provided with such multiplication device.
  3. Cressel Carmi D. (Kibbutz Urim ILX) Hendel David (Raanana ILX) Dror Itai (Beer-Sheva ILX) Hadad Isaac (Beer-Sheva ILX) Arazi Benjamin (Omer ILX), Compact microelectronic device for performing modular multiplication and exponentiation over large numbers.
  4. Clark James M. (Verona NJ), Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large u.
  5. Hellman Martin E. (Stanford CA) Pohlig Stephen C. (Acton MA), Exponentiation cryptographic apparatus and method.
  6. Clark James M. (Verona NJ) Conforti Michael (Monroe NY), High-speed modulo exponentiator device.
  7. Lagger Helmut (Ottobrunn DEX) Schmid Elisabeth (Mauerkirchen ATX) Haider Erich (Linz ATX), Method and apparatus for the exponentiation of large binary numbers in a residue class modulo N, particularly for encodi.
  8. Brickell Ernest F. (Albuquerque NM) Gordon Daniel M. (San Diego CA) McCurley Kevin S. (Albuquerque NM), Method for exponentiating in cryptographic systems.
  9. Dariel Eran J. (Raanana ILX) Gressel Carmi D. (D.N. Negev ILX), Microcircuit for the implementation of RSA algorithm and ordinary and modular arithmetic, in particular exponentiation,.
  10. Schlafly Roger (P.O. Box 1680 Soquel CA 95073), Modular exponentiation and reduction device and method.
  11. Kawamura Shinichi,JPX, Modular exponentiation calculation apparatus and method.
  12. Omura Jimmy K. (Cupertino CA), Modulo arithmetic processor chip.

이 특허를 인용한 특허 (61)

  1. Gunnam, Kiran Kumar; Fuller, Jay Scott, Analog circuitry to conceal activity of logic circuitry.
  2. Sandhu, Bal S.; Lattimore, George McNeil; Vineyard, Carl Wayne, Apparatus and method for obfuscating power consumption of a processor.
  3. Takahashi, Richard J.; Osugi, Kevin J., Circuit and method for performing multiple modulo mathematic operations.
  4. Coron,Jean S챕bastien, Countermeasure method in an electric component implementing an elliptical curve type public key cryptography algorithm.
  5. Qiu, Xin; Sprunk, Eric J.; Simon, Daniel Z.; Tang, Lawrence; Cook, Lawrence R., Countermeasure to power attack and timing attack on cryptographic operations.
  6. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Cryptographic computation using masking to prevent differential power analysis and other attacks.
  7. Ciet, Mathieu; Feix, Benoit, Cryptographic method comprising secure modular exponentiation against hidden-channel attacks, cryptoprocessor for implementing the method and associated chip card.
  8. Kocher, Paul C., Cryptographic token with leak-resistant key derivation.
  9. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems.
  10. Feyt, Nathalie; Benoit, Olivier; Naccache, David, Devices for hiding operations performed in a microprocesser card.
  11. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis.
  12. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis method and apparatus.
  13. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  14. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  15. Shen, Qiang, Efficient computation of the modulo operation based on divisor (2-1).
  16. Peeters, Michaël; Bos, Joppe, Efficient smooth encodings for modular exponentiation.
  17. Wuidart,Sylvie, Electric circuit management method and device.
  18. Ahn, Kyoung-Moon; Shin, Jong-Hoon; Bae, Ki-Seok, Electronic device against side channel attacks.
  19. Chin,David K.; Oklobdzija,Vojin G.; Farooqui,Aamir, Encryption processor for performing accelerated computations to establish secure network sessions connections.
  20. Bos, Joppe; Peeters, Michaël, General encoding functions for modular exponentiation encryption schemes.
  21. Tanimoto, Chiaki; Nakada, Kunihiko; Tsukamoto, Takashi; Hirabayashi, Shigeo; Watase, Hiroshi; Takahashi, Masatoshi; Nariyoshi, Yuuichirou, IC card and microprocessor.
  22. Felsher, David Paul, Information record infrastructure, system and method.
  23. Gilad Odinak, Integrated circuit device with power analysis protection circuitry.
  24. Gunnam, Kiran Kumar; Fuller, Jay Scott, Integrated circuit with logic circuitry and multiple concealing circuits.
  25. Kocher,Paul C.; Jaffe,Joshua M., Leak-resistant cryptographic payment smartcard.
  26. Maddury,Mahesh S.; Tomei,Kenneth J., Method and apparatus for calculating a multiplicative inverse of an element of a prime field.
  27. Chen,Liqun; Harrison,Keith Alexander, Method and apparatus for encrypting data.
  28. Kissell, Kevin D., Method and apparatus for masking a microprocessor execution signature.
  29. Girault, Marc; Lefranc, David, Method and device for performing a cryptographic operation.
  30. Brickell, Ernie F., Method of obscuring cryptographic computations.
  31. Salle,Patrick, Method to prevent power dissipation attacks on a cryptographic algorithm by implementing a random transformation step.
  32. Benoit,Olivier, Modular exponentiation algorithm in an electronic component using a public key encryption algorithm.
  33. Bos, Joppe; Peeters, Michaël, Modular exponentiation using look-up tables.
  34. Bos, Joppe; Peeters, Michaël, Modular multiplication using look-up tables.
  35. Hoffberg, Steven M., Multifactorial optimization system and method.
  36. Thueringer, Peter; Kompan, Peter; Ully, Klaus; Posch, Stefan, Output stage for a communication contact for a data carrier.
  37. Drexler,Hermann; Vater,Harald, Portable data carrier provide with access protection by rendering messages unfamiliar.
  38. Stojancic,Mihailo M.; Maddury,Mahesh S.; Tomei,Kenneth J., Pre-computation and dual-pass modular arithmetic operation approach to implement encryption protocols efficiently in electronic integrated circuits.
  39. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Prevention of side channel attacks against block cipher implementations and other cryptographic systems.
  40. Teglia, Yannick; Liardet, Pierre-Yvan; Pomet, Alain, Protection of a modular exponentiation calculation performed by an integrated circuit.
  41. Stribaek,Morten; Jensen,Jakob Schou; Dhem,Jean Francois, Random slip generator.
  42. Stojancic,Mihailo M.; Maddury,Mahesh S.; Tomei,Kenneth J., Residue number system based pre-computation and dual-pass arithmetic modular operation approach to implement encryption protocols efficiently in electronic integrated circuits.
  43. Romain,Fabrice; Teglia,Yannick, Secure method for secret key cryptographic calculation and component using said method.
  44. Kocher Paul C. ; Jaffe Joshua M., Secure modular exponentiation with leak minimization for smartcards and other cryptosystems.
  45. Hoffberg, Steven M., System and method for determining contingent relevance.
  46. Sarmah, Dilip; Sutton, Raphael Hercules, System and method for enhanced application server.
  47. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  48. Sarmah, Dilip; Choy, Kim Hung; Sutton, Raphael Hercules; Theiding, Mark Andreas, System and method for message-based conversations.
  49. Sarmah, Dilip; Jian, Zhang; Xu, Yang, System and method for mobile user authentication.
  50. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  51. Sarmah, Dilip; Erickson, Kyle Warner; Gadagkar, Rajat Mounendrababu, System and method for second factor authentication.
  52. Sarmah, Dilip; Erickson, Kyle Warner; Gadagkar, Rajat Mounendrababu, System and method for second factor authentication.
  53. Sarmah, Dilip; Erickson, Kyle Warner; Gadagkar, Rajat Mounendrababu, System and method for second factor authentication.
  54. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  55. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  56. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  57. Kenyon, Leah Phillips; Barlok, Todd Christopher; Sheehan, Timothy Patrick, Systems and methods for electronic payment instrument repository.
  58. Kenyon, Leah Phillips; Barlok, Todd Christopher; Sheehan, Timothy Patrick, Systems and methods for electronic payment instrument repository.
  59. Marshall, Kenneth Howard; Currie, Paul T H; Salg, Joseph; Houston, Joseph B.; Harvey, James, Telescope interferometric maintenance evaluation tool.
  60. Marshall, Kenneth Howard; Currie, Paul TH; Salg, Joseph; Houston, Joseph B.; Harvey, James, Telescope interferometric maintenance evaluation tool.
  61. Marshall, Kenneth Howard; Currie, Paul Th; Salg, Joseph; Houston, Joseph B.; Harvey, James, Telescope interferometric maintenance evaluation tool.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로