| 12407490 |
Redundancy AES masking basis for attack mitigation using lookup tables |
Yaacov Belenky, Alexander Kesler |
2025-09-02 |
| 12244685 |
Carry-based differential power analysis and its application to testing for vulnerability of SHA-2 and HMAC-SHA-2 to side channel attack |
Yaacov Belenky, Alexander Kesler |
2025-03-04 |
| 12132817 |
Methods for protecting computer hardware from cyber threats |
Alexander Kesler, Vadim BUGAENKO, Yaacov Belenky |
2024-10-29 |
| 11995191 |
Side-channel attack on HMAC-SHA-2 and associated testing |
Yaacov Belenky, Alexander Kesler |
2024-05-28 |
| 11418317 |
Methods for protecting computer hardware from cyber threats |
Alexander Kesler, Vadim BUGAENKO, Yaacov Belenky |
2022-08-16 |
| 11323254 |
Device, system, and method of generating and handling cryptographic parameters |
Ruvein Itskhak Levin |
2022-05-03 |
| 11190340 |
Efficient unified hardware implementation of multiple ciphers |
Leonid Dorrendorf, Ruvein Itskhak Levin |
2021-11-30 |