Issued Patents All Time
Showing 1–25 of 42 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12413399 | Fault detection in post-quantum cyptography | Melissa Azouaoui, Tobias Schneider, Joost Roland Renes, Björn Fay | 2025-09-09 |
| 12388654 | Method for superflous hash usage in hash-based signatures | Christine van Vredendaal | 2025-08-12 |
| 12177363 | Fault countermeasures for digital signatures with aborts | Joost Roland Renes, Melissa Azouaoui, Björn Fay, Tobias Schneider | 2024-12-24 |
| 12047491 | Speeding up hash-chain computations | Mario Lamberger, Joost Roland Renes, Tobias Schneider, Christine van Vredendaal | 2024-07-23 |
| 11847938 | Combining regular and symbolic NTTs using co-processors | Joost Roland Renes, Christine van Vredendaal, Tobias Schneider | 2023-12-19 |
| 11847545 | Systems and methods involving a combination of machine learning models | Nikita Veshchikov | 2023-12-19 |
| 11687678 | Device, integrated circuit and methods for detecting, responding to and removing a compromising attack | Marcel Medwed, Tobias Schneider, Ventzislav Nikov, Jorge Pereira, Rudi Verslegers +2 more | 2023-06-27 |
| 11595195 | Masked decoding of polynomials | Tobias Schneider, Björn Fay, Marc Gourjon, Joost Roland Renes, Christine van Vredendaal | 2023-02-28 |
| 11586989 | Method for detecting if a machine learning model has been copied using intermediate outputs of the machine learning model | Simon Johann Friedberger, Nikita Veshchikov, Christine van Vredendaal | 2023-02-21 |
| 11528124 | Masked comparison circumventing compression in post-quantum schemes | Marc Gourjon, Joost Roland Renes, Tobias Schneider, Christine van Vredendaal | 2022-12-13 |
| 11502819 | Efficient masked polynomial comparison | Tobias Schneider, Joost Roland Renes, Christine van Vredendaal | 2022-11-15 |
| 11500970 | Machine learning model and method for determining if the machine learning model has been copied | Simon Johann Friedberger, Nikita Veshchikov, Christine van Vredendaal | 2022-11-15 |
| 11444767 | Method for multiplying polynomials for a cryptographic operation | Joost Roland Renes, Tobias Schneider, Christine van Vredendaal | 2022-09-13 |
| 11409843 | Method for protecting a software program from copying | Nikita Veshchikov, Simon Johann Friedberger, Christine van Vredendaal | 2022-08-09 |
| 11409845 | Method for determining if a machine learning model has been copied | Nikita Veshchikov, Simon Johann Friedberger | 2022-08-09 |
| 11409995 | Anomaly detection by classifying past behavior | Nikita Veshchikov | 2022-08-09 |
| 11410078 | Method and data processing system for making machine learning model more resistent to adversarial examples | Simon Johann Friedberger, Christiaan Kuipers, Vincent Verneuil, Nikita Veshchikov, Christine van Vredendaal +1 more | 2022-08-09 |
| 11270227 | Method for managing a machine learning model | Nikita Veshchikov, Wilhelmus Petrus Adrianus Johannus Michiels | 2022-03-08 |
| 11206130 | Customizing cryptographic keys between multiple hosts | Rudi Verslegers, Wilhelmus Petrus Adrianus Johannus Michiels | 2021-12-21 |
| 11206136 | Method for multiplying polynomials for a cryptographic operation | Joost Roland Renes, Tobias Schneider, Christine van Vredendaal | 2021-12-21 |
| 10873459 | Password authentication using white-box cryptography | Rudi Verslegers, Wilhelmus Petrus Adrianus Johannus Michiels | 2020-12-22 |
| 10790991 | Deterministic digital signature method without using a hash function | Florian Boehl | 2020-09-29 |
| 10680810 | Method of generating an elliptic curve cryptographic key pair | Björn Fay, Bruce Murray | 2020-06-09 |
| 10680818 | Encryption schemes with additional properties | Marc Joye | 2020-06-09 |
| 10652011 | White-box implementations with garbled circuits | Jan Hoogerbrugge, Marc Joye, Wilhelmus Petrus Adrianus Johannus Michiels | 2020-05-12 |