| 12265626 |
Apparatuses and methods with secure configuration update |
Marcel Medwed, Tobias Schneider |
2025-04-01 |
| 11914703 |
Method and data processing system for detecting a malicious component on an integrated circuit |
Nikita Veshchikov |
2024-02-27 |
| 11687678 |
Device, integrated circuit and methods for detecting, responding to and removing a compromising attack |
Marcel Medwed, Tobias Schneider, Jorge Pereira, Rudi Verslegers, Nikita Veshchikov +2 more |
2023-06-27 |
| 11295025 |
Probabilistic memory safety using cryptography |
Marcel Medwed, Jan Hoogerbrugge, Asier Goikoetxea Yanci |
2022-04-05 |
| 10824560 |
Using a memory safety violation indicator to detect accesses to an out-of-bounds or unallocated memory area |
Jan Hoogerbrugge, Marcel Medwed, Asier Goikoetxea Yanci |
2020-11-03 |
| 10678474 |
Peripheral based memory safety scheme for multi-core platforms |
Marcel Medwed, Jan Hoogerbrugge |
2020-06-09 |
| 10680798 |
Masking storage transfer to protect against attacks |
Miroslav Knezevic |
2020-06-09 |
| 10630462 |
Using white-box in a leakage-resilient primitive |
Wilhelmus Petrus Adrianus Johannus Michiels, Marcel Medwed, Jan Hoogerbrugge, Bruce Murray, Joppe Willem Bos |
2020-04-21 |
| 10567155 |
Securing a cryptographic device |
Marcel Medwed, Martin Feldhofer |
2020-02-18 |
| 9979543 |
Optimized hardware architecture and method for ECC point doubling using jacobian coordinates over short weierstrass curves |
Miroslav Knezevic |
2018-05-22 |
| 9965401 |
Method of obfuscating a code |
Philippe Teuwen |
2018-05-08 |
| 9961057 |
Securing a cryptographic device against implementation attacks |
Marcel Medwed, Martin Feldhofer |
2018-05-01 |
| 9929862 |
Optimized hardware architecture and method for ECC point doubling using Jacobian coordinates over short Weierstrass curves |
Miroslav Knezevic |
2018-03-27 |
| 9906505 |
RSA decryption using multiplicative secret sharing |
Michael Peeters |
2018-02-27 |
| 9900154 |
Optimized hardward architecture and method for ECC point addition using mixed affine-jacobian coordinates over short weierstrass curves |
Miroslav Knezevic |
2018-02-20 |
| 9641541 |
Data processing apparatus |
Michael Peeters, Claude Debast |
2017-05-02 |
| 9576116 |
Secure software components anti-reverse-engineering by table interleaving |
Philippe Teuwen, Peter Maria Franciscus Rombouts |
2017-02-21 |
| 9465926 |
Method of obfuscating a code |
Philippe Teuwen |
2016-10-11 |
| 9355504 |
Data processing apparatus |
Michael Peeters, Claude Debast |
2016-05-31 |
| 9015497 |
Data processing apparatus |
Michael Peeters, Claude Debast |
2015-04-21 |
| 8694778 |
Enrollment of physically unclonable functions |
Philippe Teuwen |
2014-04-08 |
| 8516258 |
Generator for generating a message authentication code, method of generating a message authentication code, program element and computer-readable medium |
Marc Vauclair, Serret Avila Javier |
2013-08-20 |