Issued Patents All Time
Showing 25 most recent of 45 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11797683 | Security chip with resistance to external monitoring attacks | Paul C. Kocher, Joshua M. Jaffe | 2023-10-24 |
| 11777926 | Internet of things (IoT) device management | Denis Alexandrovich Pochuev, Michael Alexander Hamburg, Amit Kapoor, Joel Patrick Wittenauer | 2023-10-03 |
| 11757617 | Performing cryptographic data processing operations in a manner resistant to external monitoring attacks | Sami James Saab, Craig E. Hampel | 2023-09-12 |
| 11507659 | Enhancements to improve side channel resistance | Sami James Saab, Elke De Mulder, Craig E. Hampel, Jeremy R. Cooper, Winthrop John Wu | 2022-11-22 |
| 11463236 | Programmable block cipher with masked inputs | Rodrigo Portella do Canto, Elke De Mulder, Matthew Pond Baker | 2022-10-04 |
| 11228422 | Configuring a device based on a DPA countermeasure | Christopher Gori | 2022-01-18 |
| 11101981 | Generating a pseudorandom number based on a portion of shares used in a cryptographic operation | Elke De Mulder, Michael Hutter | 2021-08-24 |
| 11074349 | Apparatus with anticounterfeiting measures | Paul C. Kocher, Joshua M. Jaffe | 2021-07-27 |
| 10897344 | Performing cryptographic data processing operations in a manner resistant to external monitoring attacks | Sami James Saab, Craig E. Hampel | 2021-01-19 |
| 10789358 | Enhancements to improve side channel resistance | Sami James Saab, Elke De Mulder, Craig E. Hampel, Jeremy R. Cooper, Winthrop John Wu | 2020-09-29 |
| 10530566 | Configuring a device based on a DPA countermeasure | Christopher Gori | 2020-01-07 |
| 10382193 | Performing cryptographic data processing operations in a manner resistant to external monitoring attacks | Sami James Saab, Craig E. Hampel | 2019-08-13 |
| 10333699 | Generating a pseudorandom number based on a portion of shares used in a cryptographic operation | Elke De Mulder, Michael Hutter | 2019-06-25 |
| 10262141 | Secure processor with resistance to external monitoring attacks | Paul C. Kocher, Joshua M. Jaffe | 2019-04-16 |
| 9940463 | System and method for secure authentication | Paul C. Kocher, Joshua M. Jaffe | 2018-04-10 |
| 9582674 | Risk adaptive information flow based access control | Pau-Chen Cheng, Claudia Keser, Josyula R. Rao | 2017-02-28 |
| 9576133 | Detection of data tampering of encrypted data | Paul C. Kocher, Joshua M. Jaffe | 2017-02-21 |
| 9569623 | Secure boot with resistance to differential power analysis and other external monitoring attacks | Paul C. Kocher, Joshua M. Jaffe | 2017-02-14 |
| 9367693 | Bitstream confirmation for configuration of a programmable logic device | Paul C. Kocher, Joshua M. Jaffe | 2016-06-14 |
| 8977864 | Programmable logic device with resistance to external monitoring attacks | Paul C. Kocher, Joshua M. Jaffe | 2015-03-10 |
| 8707052 | Cryptographic device with resistance to differential power analysis and other external monitoring attacks | Paul C. Kocher, Joshua M. Jaffe | 2014-04-22 |
| 8650623 | Risk adaptive information flow based access control | Pau-Chen Cheng, Claudia Keser, Josyula R. Rao | 2014-02-11 |
| 8606724 | Policy evolution with machine learning | Pau-Chen Cheng, John Andrew Clark, Yow Tzu Lim | 2013-12-10 |
| 8386800 | Verifiable, leak-resistant encryption and decryption | Paul C. Kocher, Joshua M. Jaffe | 2013-02-26 |
| 8276192 | System and method for security planning with hard security constraints | Kay S. Anderson, Pau-Chen Cheng, Genady Grabarnik, Paul A. Karger, Marc Lelarge +4 more | 2012-09-25 |