Issued Patents All Time
Showing 25 most recent of 39 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12001579 | Cloud messaging system | Benoit Chevallier-Mames, Mathieu Ciet, Oliver J. Hunt, Yannick L. Sierra, Gokul P. Thirumalai +1 more | 2024-06-04 |
| 11995446 | Branch predictor storing encrypted information | Steven A. Myers, Jeffry E. Gonion, Yannick L. Sierra | 2024-05-28 |
| 11728972 | Methods and architectures for secure ranging | Yannick L. Sierra, Zhimin Chen | 2023-08-15 |
| 11405185 | Methods and architectures for secure ranging | Yannick L. Sierra, Zhimin Chen | 2022-08-02 |
| 11321095 | Indirect branch predictor security protection | Steven A. Myers, Jeffry E. Gonion, Yannick L. Sierra | 2022-05-03 |
| 11177955 | Device-to-device messaging protocol | Frederic Jacobs, Yannick L. Sierra | 2021-11-16 |
| 11025596 | Cloud messaging system | Benoit Chevallier-Mames, Mathieu Ciet, Oliver J. Hunt, Yannick L. Sierra, Gokul P. Thirumalai +1 more | 2021-06-01 |
| 10164772 | Permutation composition based hash function | Mathieu Ciet, Augustin J. Farrugia | 2018-12-25 |
| 10027483 | Cryptography on an elliptical curve | Jean-Sebastien Coron | 2018-07-17 |
| 9866371 | Cryptography on a simplified elliptical curve | — | 2018-01-09 |
| 9774443 | Computing key-schedules of the AES for use in white boxes | Benoit Chevallier-Mames, Bruno Kindarji, Augustin J. Farrugia, Mathieu Ciet | 2017-09-26 |
| 9716586 | Precomputing internal AES states in counter mode to protect keys used in AES computations | Benoit Chevallier-Mames, Mathieu Ciet, Bruno Kindarji, Augustin J. Farrugia | 2017-07-25 |
| 9692592 | Using state reordering to protect against white box attacks | Bruno Kindarji, Benoit Chevallier-Mames, Mathieu Ciet, Augustin J. Farrugia | 2017-06-27 |
| 9639673 | Protecting software through a fake cryptographic layer | Pierre Betouin, Augustin J. Farrugia, Benoit Chevallier-Mames, Bruno Kindarji, Cédric Tessier +2 more | 2017-05-02 |
| 9565018 | Protecting cryptographic operations using conjugacy class functions | Augustin J. Farrugia, Benoit Chevallier-Mames, Bruno Kindarji, Mathieu Ciet | 2017-02-07 |
| 9515818 | Multi-block cryptographic operation | Bruno Kindarji, Mathieu Ciet, Benoit Chevallier-Mames, Augustin J. Farrugia | 2016-12-06 |
| 9336370 | Method and apparatus for dynamic obfuscation of static data | Benoit Chevallier-Mames, Daniel F. Reynaud, Jonathan G. McLachlan, Julien Lerouge, Mathieu Ciet | 2016-05-10 |
| 9264222 | Precomputing internal AES states in counter mode to protect keys used in AES computations | Benoit Chevallier-Mames, Mathieu Ciet, Bruno Kindarji, Augustin J. Farrugia | 2016-02-16 |
| 9264234 | Secure authentication of identification for computing devices | Augustin J. Farrugia, David M'Raihi, Mathieu Ciet | 2016-02-16 |
| 9189425 | Protecting look up tables by mixing code and operations | Augustin J. Farrugia, Benoit Chevallier-Mames, Bruno Kindarji, Mathieu Ciet | 2015-11-17 |
| 9143317 | Protecting against white box attacks using column rotation | Benoit Chevallier-Mames, Mathieu Ciet, Bruno Kindarji, Augustin J. Farrugia | 2015-09-22 |
| 8976960 | Methods and apparatus for correlation protected processing of cryptographic operations | Mathieu Ciet, Benoit Chevallier-Mames, Bruno Kindarji, Augustin J. Farrugia | 2015-03-10 |
| 8966279 | Securing the implementation of a cryptographic process using key expansion | Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Bruno Kindarji | 2015-02-24 |
| 8918768 | Methods and apparatus for correlation protected processing of data operations | Benoit Chevallier-Mames, Mathieu Ciet, Bruno Kindarji, Augustin J. Farrugia | 2014-12-23 |
| 8832450 | Methods and apparatus for data hashing based on non-linear operations | Mathieu Ciet, Augustin J. Farrugia | 2014-09-09 |