| 12277205 |
User interfaces for digital identification |
Pablo Pons Bordes, Gianpaolo Fasoli, Tyler GENTLES, Petr Kostka, Rohit Narula +3 more |
2025-04-15 |
| 10868672 |
Establishing and verifying identity using biometrics while protecting user privacy |
Augustin J. Farrugia, Ritwik K. Kumar, Gianpaolo Fasoli, Mathieu Ciet, Eric D. Friedman +2 more |
2020-12-15 |
| 9774443 |
Computing key-schedules of the AES for use in white boxes |
Benoit Chevallier-Mames, Thomas Icart, Augustin J. Farrugia, Mathieu Ciet |
2017-09-26 |
| 9716586 |
Precomputing internal AES states in counter mode to protect keys used in AES computations |
Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Augustin J. Farrugia |
2017-07-25 |
| 9692592 |
Using state reordering to protect against white box attacks |
Benoit Chevallier-Mames, Mathieu Ciet, Augustin J. Farrugia, Thomas Icart |
2017-06-27 |
| 9639673 |
Protecting software through a fake cryptographic layer |
Pierre Betouin, Augustin J. Farrugia, Benoit Chevallier-Mames, Cédric Tessier, Jean-Baptiste Aviat +2 more |
2017-05-02 |
| 9565018 |
Protecting cryptographic operations using conjugacy class functions |
Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart |
2017-02-07 |
| 9515818 |
Multi-block cryptographic operation |
Mathieu Ciet, Benoit Chevallier-Mames, Thomas Icart, Augustin J. Farrugia |
2016-12-06 |
| 9264222 |
Precomputing internal AES states in counter mode to protect keys used in AES computations |
Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Augustin J. Farrugia |
2016-02-16 |
| 9189425 |
Protecting look up tables by mixing code and operations |
Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart |
2015-11-17 |
| 9143317 |
Protecting against white box attacks using column rotation |
Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Augustin J. Farrugia |
2015-09-22 |
| 8976960 |
Methods and apparatus for correlation protected processing of cryptographic operations |
Mathieu Ciet, Benoit Chevallier-Mames, Thomas Icart, Augustin J. Farrugia |
2015-03-10 |
| 8972727 |
Method of identification or authorization, and associated system and secure module |
Herve Chabanne, Julien Bringer |
2015-03-03 |
| 8966279 |
Securing the implementation of a cryptographic process using key expansion |
Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart |
2015-02-24 |
| 8918768 |
Methods and apparatus for correlation protected processing of data operations |
Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Augustin J. Farrugia |
2014-12-23 |
| 8700912 |
Identification based on encrypted biometric data |
Herve Chabanne, Julien Bringer |
2014-04-15 |
| 8675866 |
Multiplicative splits to protect cipher keys |
Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart |
2014-03-18 |
| 8661549 |
Method and apparatus for obfuscating program source codes |
Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Augustin J. Farrugia |
2014-02-25 |
| 8605894 |
Cryptographic process execution protecting an input value against attacks |
Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart |
2013-12-10 |