Issued Patents All Time
Showing 26–50 of 82 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8966279 | Securing the implementation of a cryptographic process using key expansion | Augustin J. Farrugia, Benoit Chevallier-Mames, Thomas Icart, Bruno Kindarji | 2015-02-24 |
| 8935539 | System and method for revising boolean and arithmetic operations | Augustin J. Farrugia, Filip Toma Paun, Jean-Francois Riendeau | 2015-01-13 |
| 8918768 | Methods and apparatus for correlation protected processing of data operations | Benoit Chevallier-Mames, Thomas Icart, Bruno Kindarji, Augustin J. Farrugia | 2014-12-23 |
| 8886940 | Hash function using a card shuffling process | Benoit Chevallier-Mames, Augustin J. Farrugia | 2014-11-11 |
| 8881290 | Method and apparatus for computer code obfuscation and deobfuscation using boot installation | Julien Lerouge, Augustin J. Farrugia | 2014-11-04 |
| 8874928 | System and method for obfuscating constants in a computer program | Pierre Betouin, Augustin J. Farrugia | 2014-10-28 |
| 8862896 | Data protection using key translation | Gelareh Taban, Filip Toma Paun, Benoit Chevallier-Mames, Augustin J. Farrugia | 2014-10-14 |
| 8832450 | Methods and apparatus for data hashing based on non-linear operations | Thomas Icart, Augustin J. Farrugia | 2014-09-09 |
| 8775826 | Counteracting memory tracing on computing systems by code obfuscation | Augustin J. Farrugia, Pierre Betouin | 2014-07-08 |
| 8755521 | Security method and system for media playback devices | Augustin J. Farrugia, Pierre Betouin | 2014-06-17 |
| 8718280 | Securing keys of a cipher using properties of the cipher process | Augustin J. Farrugia, Benoit Chevallier-Mames, Thomas Icart | 2014-05-06 |
| 8707053 | Performing boolean logic operations using arithmetic operations by code obfuscation | Augustin J. Farrugia, Benoit Chevallier-Mames, Thomas Icart | 2014-04-22 |
| 8699702 | Securing cryptographic process keys using internal structures | Augustin J. Farrugia, Benoit Chevallier-Mames | 2014-04-15 |
| 8687803 | Operational mode for block ciphers | Augustin J. Farrugia, Benoit Chevallier-Mames, Melanie Riendeau, Thomas Icart | 2014-04-01 |
| 8681975 | Encryption method and apparatus using composition of ciphers | Augustin J. Farrugia, Nicholas Thomas Sullivan, Gianpaolo Fasoli | 2014-03-25 |
| 8675866 | Multiplicative splits to protect cipher keys | Augustin J. Farrugia, Benoit Chevallier-Mames, Bruno Kindarji, Thomas Icart | 2014-03-18 |
| 8667301 | Obfuscating transformations on data array content and addresses | Augustin J. Farrugia, Benoit Chevallier-Mames | 2014-03-04 |
| 8661549 | Method and apparatus for obfuscating program source codes | Benoit Chevallier-Mames, Thomas Icart, Augustin J. Farrugia, Bruno Kindarji | 2014-02-25 |
| 8644500 | Apparatus and method for block cipher process for insecure environments | Augustin J. Farrugia, Thomas Icart | 2014-02-04 |
| 8645693 | Zero-knowledge based authentication method, system, and apparatus | Augustin J. Farrugia, Bertrand Mollinier Toublet, Gianpaolo Fasoli, Jill Surdzial | 2014-02-04 |
| 8605894 | Cryptographic process execution protecting an input value against attacks | Augustin J. Farrugia, Benoit Chevallier-Mames, Bruno Kindarji, Thomas Icart | 2013-12-10 |
| 8553878 | Data transformation system using cyclic groups | Augustin J. Farrugia, Benoit Chevallier-Mames | 2013-10-08 |
| 8504845 | Protecting states of a cryptographic process using group automorphisms | Augustin J. Farrugia, Thomas Icart | 2013-08-06 |
| 8434059 | Systems, methods, and computer-readable media for fertilizing machine-executable code | Pierre Betouin, Augustin J. Farrugia | 2013-04-30 |
| 8428251 | System and method for stream/block cipher with internal random states | Augustin J. Farrugia, Filip Toma Paun | 2013-04-23 |