Combining regular and symbolic NTTs using co-processors

    公开(公告)号:US11847938B2

    公开(公告)日:2023-12-19

    申请号:US17392332

    申请日:2021-08-03

    Applicant: NXP B.V.

    CPC classification number: G09C1/00 G06F7/523

    Abstract: Various embodiments relate to a method for multiplying a first and a second polynomial in a ring q [X]/(Xn+1) where q is a positive integer. The method comprising: mapping the first polynomial into k smaller third polynomials over k smaller rings based upon primitive roots of unity, where k is a positive integer; mapping the second polynomial into k smaller fourth polynomials over the k smaller rings based upon primitive roots of unity; applying an isomorphism to the k third polynomials resulting in k fifth polynomials; applying the isomorphism to the k fourth polynomials resulting in k sixth polynomials; applying a Kronecker substitution on the k fifth polynomials and the k sixth polynomials and perform the multiplication of the k fifth polynomials and the k sixth polynomials to produce a multiplication result; applying an inverse of the isomorphism to the multiplication result to obtain the multiplication of the first polynomial and the second polynomial; and mapping the k inverted polynomials to a single polynomial in the ring.

    Biometric system
    12.
    发明授权

    公开(公告)号:US11790069B2

    公开(公告)日:2023-10-17

    申请号:US17658034

    申请日:2022-04-05

    Applicant: NXP B.V.

    Abstract: A data processing system and a method are provided for recognizing a scanned biometric characteristic in the data processing system. The data processing system includes a biometric sensor, a rich execution environment (REE), and a secure element (SE). In one embodiment, during an enrollment operation, a random challenge is applied to scanned data to produce a biometric template that is stored. During subsequent validation operations, the SE determines if user data includes evidence of the random challenge before providing access to a secure application. Evidence of the random challenge indicates the user data was provided by the biometric sensor. In another embodiment, the sensor data is split between the REE and the SE and partially processed in the SE. The described embodiments prevent a replay attack from being conducted in communications between the REE and the SE.

    SPEEDING UP HASH-CHAIN COMPUTATIONS

    公开(公告)号:US20220376892A1

    公开(公告)日:2022-11-24

    申请号:US17243058

    申请日:2021-04-28

    Applicant: NXP B.V.

    Abstract: Various embodiments relate to a hardware device configured to compute a plurality of chained hash functions in parallel, including: a processor implementing p hash functions configured to operate on a small input, where p is an integer; a data unit connected to the plurality of hash functions, configured to store the outputs of plurality of hash functions that are then used as the input to a next round of computing the hash function, wherein the processor receives a single instruction and p small data inputs, and wherein each of the p hash functions are used to perform a chained hash function operation on a respective small input of the p small inputs.

    MASKED DECODING OF POLYNOMIALS
    14.
    发明申请

    公开(公告)号:US20220337398A1

    公开(公告)日:2022-10-20

    申请号:US17226770

    申请日:2021-04-09

    Applicant: NXP B.V.

    Abstract: Various embodiments relate to a method for masked decoding of a polynomial a using an arithmetic sharing a to perform a cryptographic operation in a data processing system using a modulus q, the method for use in a processor of the data processing system, including: subtracting an offset δ from each coefficient of the polynomial a; applying an arithmetic to Boolean (A2B) function on the arithmetic shares of each coefficient ai of the polynomial a to produce Boolean shares âi that encode the same secret value ai; and performing in parallel for all coefficients a shared binary search to determine which of coefficients ai are greater than a threshold t to produce a Boolean sharing value {circumflex over (b)} of the bitstring b where each bit of b decodes a coefficient of the polynomial a.

    Method for protecting a software program from copying

    公开(公告)号:US11409843B2

    公开(公告)日:2022-08-09

    申请号:US16598148

    申请日:2019-10-10

    Applicant: NXP B.V.

    Abstract: A method is provided for protecting a software program from copying. The method includes providing a first implementation of the software program. A second implementation of the software program is then provided. The second implementation provides a same functionality as the first implementation, and wherein the second implementation includes a plurality of dummy operations to increase a number of operations and an execution time of the second implementation compared to the first implementation. The dummy operations are encoded. The second implementation may then be compared to another software program to determine if the another software program is a copy of the first implementation of the software program. This allows a copy of the first implementation to be detected without disclosing the first implementation.

    METHOD FOR ANALYZING CLASS SIMILARITIES IN A MACHINE LEARNING MODEL

    公开(公告)号:US20220067503A1

    公开(公告)日:2022-03-03

    申请号:US17002978

    申请日:2020-08-26

    Applicant: NXP B.V.

    Abstract: A method is provided for analyzing a similarly between classes of a plurality of classes in a trained machine learning model (ML). The method includes collecting weights of connections from each node of a first predetermined layer of a neural network (NN) to each node of a second predetermined layer of the NN to which the nodes of the first predetermined layer are connected. The collected weights are used to calculate distances from each node of the first predetermined layer to nodes of the second predetermined layer to which the first predetermined layer nodes are connected. The distances are compared to determine which classes the NN determines are similar. Two or more of the similar classes may then be analyzed using any of a variety of techniques to determine why the two or more classes of the NN were determined to be similar.

    METHOD AND MACHINE LEARNING SYSTEM FOR DETECTING ADVERSARIAL EXAMPLES

    公开(公告)号:US20210089957A1

    公开(公告)日:2021-03-25

    申请号:US16576830

    申请日:2019-09-20

    Applicant: NXP B.V.

    Abstract: A method and machine learning system for detecting adversarial examples is provided. A first machine learning model is trained with a first machine learning training data set having only training data samples with robust features. A second machine learning model is trained with a second machine learning training data set, the second machine learning training data set having only training data samples with non-robust features. A feature is a distinguishing element in a data sample. A robust feature is more resistant to adversarial perturbations than a non-robust feature. A data sample is provided to each of the first and second trained machine learning models during an inference operation. if the first trained machine learning model classifies the data sample with high confidence, and the second trained machine learning model classifies the data sample differently with a high confidence, then the data sample is determined to be an adversarial example.

    MACHINE LEARNING MODEL AND METHOD FOR DETERMINING IF THE MACHINE LEARNING MODEL HAS BEEN COPIED

    公开(公告)号:US20210034721A1

    公开(公告)日:2021-02-04

    申请号:US16529882

    申请日:2019-08-02

    Applicant: NXP B.V.

    Abstract: A method and data processing system are provided for determining if a machine learning model has been copied. The machine learning model has a plurality of nodes, the plurality of nodes is organized as a plurality of interconnected layers, and the plurality of interconnected layers includes an input layer and an output layer. The output layer has a predetermined number of output nodes for classifying input samples into a predetermined number of categories, where each output node corresponds to a category. An additional watermarking node is added to the output layer. The model is trained to classify the input data into the predetermined number of categories and into an additional category for the additional node. The additional node may be added to another model to determine if the another model is a copy or clone of the ML model.

    PROCESSOR TO ACCELERATE AND SECURE HASH-BASED SIGNATURE COMPUTATIONS

    公开(公告)号:US20240430099A1

    公开(公告)日:2024-12-26

    申请号:US18337795

    申请日:2023-06-20

    Applicant: NXP B.V.

    Abstract: A secure processing system configured to produce a hash based digital signature of a message, including: random number generator (RNG); a monotonic counter device configured to produce a monotonically increasing counter value; a hash accelerator configured to produce a hash of the message based upon a random number from the RNG and the counter value; and a run time integrity check (RTIC) device configured to check the integrity of the operation of the hash accelerator based upon the counter value.

    KEY DERIVATION METHODS FOR HASH-BASED SIGNATURE SCHEMES

    公开(公告)号:US20240388429A1

    公开(公告)日:2024-11-21

    申请号:US18319982

    申请日:2023-05-18

    Applicant: NXP B.V.

    Abstract: A data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for generating keys in a hash based signature system in a processor, the instructions, including: generating, by a random number generator, a seed; repeatedly hashing the seed with a first hash function to produce n/k chained seeds, wherein n is a total number secret keys generated and k is a number of secret keys generated from each chained seed; and generating k secret keys from each of the n/k chained seeds using a second hash function, wherein at least one of the k secret keys is generated from another of the k secret keys in a sequential chain.

Patent Agency Ranking