-
公开(公告)号:US11847938B2
公开(公告)日:2023-12-19
申请号:US17392332
申请日:2021-08-03
Applicant: NXP B.V.
Inventor: Joost Roland Renes , Joppe Willem Bos , Christine van Vredendaal , Tobias Schneider
Abstract: Various embodiments relate to a method for multiplying a first and a second polynomial in a ring q [X]/(Xn+1) where q is a positive integer. The method comprising: mapping the first polynomial into k smaller third polynomials over k smaller rings based upon primitive roots of unity, where k is a positive integer; mapping the second polynomial into k smaller fourth polynomials over the k smaller rings based upon primitive roots of unity; applying an isomorphism to the k third polynomials resulting in k fifth polynomials; applying the isomorphism to the k fourth polynomials resulting in k sixth polynomials; applying a Kronecker substitution on the k fifth polynomials and the k sixth polynomials and perform the multiplication of the k fifth polynomials and the k sixth polynomials to produce a multiplication result; applying an inverse of the isomorphism to the multiplication result to obtain the multiplication of the first polynomial and the second polynomial; and mapping the k inverted polynomials to a single polynomial in the ring.
-
公开(公告)号:US11790069B2
公开(公告)日:2023-10-17
申请号:US17658034
申请日:2022-04-05
Applicant: NXP B.V.
Inventor: Christine van Vredendaal , Hans de Jong , Marc Vauclair
CPC classification number: G06F21/32 , G06F7/582 , G06F21/604 , G06V10/761 , G06V40/10 , G06V40/1365 , H04L63/1466 , G06F2221/2103 , G06V40/58
Abstract: A data processing system and a method are provided for recognizing a scanned biometric characteristic in the data processing system. The data processing system includes a biometric sensor, a rich execution environment (REE), and a secure element (SE). In one embodiment, during an enrollment operation, a random challenge is applied to scanned data to produce a biometric template that is stored. During subsequent validation operations, the SE determines if user data includes evidence of the random challenge before providing access to a secure application. Evidence of the random challenge indicates the user data was provided by the biometric sensor. In another embodiment, the sensor data is split between the REE and the SE and partially processed in the SE. The described embodiments prevent a replay attack from being conducted in communications between the REE and the SE.
-
公开(公告)号:US20220376892A1
公开(公告)日:2022-11-24
申请号:US17243058
申请日:2021-04-28
Applicant: NXP B.V.
Inventor: Joppe Willem Bos , Mario Lamberger , Joost Roland Renes , Tobias Schneider , Christine van Vredendaal
Abstract: Various embodiments relate to a hardware device configured to compute a plurality of chained hash functions in parallel, including: a processor implementing p hash functions configured to operate on a small input, where p is an integer; a data unit connected to the plurality of hash functions, configured to store the outputs of plurality of hash functions that are then used as the input to a next round of computing the hash function, wherein the processor receives a single instruction and p small data inputs, and wherein each of the p hash functions are used to perform a chained hash function operation on a respective small input of the p small inputs.
-
公开(公告)号:US20220337398A1
公开(公告)日:2022-10-20
申请号:US17226770
申请日:2021-04-09
Applicant: NXP B.V.
Inventor: Tobias Schneider , Joppe Willem Bos , Björn Fay , Marc Gourjon , Joost Roland Renes , Christine van Vredendaal
Abstract: Various embodiments relate to a method for masked decoding of a polynomial a using an arithmetic sharing a to perform a cryptographic operation in a data processing system using a modulus q, the method for use in a processor of the data processing system, including: subtracting an offset δ from each coefficient of the polynomial a; applying an arithmetic to Boolean (A2B) function on the arithmetic shares of each coefficient ai of the polynomial a to produce Boolean shares âi that encode the same secret value ai; and performing in parallel for all coefficients a shared binary search to determine which of coefficients ai are greater than a threshold t to produce a Boolean sharing value {circumflex over (b)} of the bitstring b where each bit of b decodes a coefficient of the polynomial a.
-
公开(公告)号:US11409843B2
公开(公告)日:2022-08-09
申请号:US16598148
申请日:2019-10-10
Applicant: NXP B.V.
Inventor: Nikita Veshchikov , Joppe Willem Bos , Simon Johann Friedberger , Christine van Vredendaal
Abstract: A method is provided for protecting a software program from copying. The method includes providing a first implementation of the software program. A second implementation of the software program is then provided. The second implementation provides a same functionality as the first implementation, and wherein the second implementation includes a plurality of dummy operations to increase a number of operations and an execution time of the second implementation compared to the first implementation. The dummy operations are encoded. The second implementation may then be compared to another software program to determine if the another software program is a copy of the first implementation of the software program. This allows a copy of the first implementation to be detected without disclosing the first implementation.
-
公开(公告)号:US20220067503A1
公开(公告)日:2022-03-03
申请号:US17002978
申请日:2020-08-26
Applicant: NXP B.V.
Inventor: Brian Ermans , Gerardus Antonius Franciscus Derks , Wilhelmus Petrus Adrianus Johannus Michiels , Christine van Vredendaal
Abstract: A method is provided for analyzing a similarly between classes of a plurality of classes in a trained machine learning model (ML). The method includes collecting weights of connections from each node of a first predetermined layer of a neural network (NN) to each node of a second predetermined layer of the NN to which the nodes of the first predetermined layer are connected. The collected weights are used to calculate distances from each node of the first predetermined layer to nodes of the second predetermined layer to which the first predetermined layer nodes are connected. The distances are compared to determine which classes the NN determines are similar. Two or more of the similar classes may then be analyzed using any of a variety of techniques to determine why the two or more classes of the NN were determined to be similar.
-
公开(公告)号:US20210089957A1
公开(公告)日:2021-03-25
申请号:US16576830
申请日:2019-09-20
Applicant: NXP B.V.
Inventor: Brian Ermans , Peter Doliwa , Christine van Vredendaal
Abstract: A method and machine learning system for detecting adversarial examples is provided. A first machine learning model is trained with a first machine learning training data set having only training data samples with robust features. A second machine learning model is trained with a second machine learning training data set, the second machine learning training data set having only training data samples with non-robust features. A feature is a distinguishing element in a data sample. A robust feature is more resistant to adversarial perturbations than a non-robust feature. A data sample is provided to each of the first and second trained machine learning models during an inference operation. if the first trained machine learning model classifies the data sample with high confidence, and the second trained machine learning model classifies the data sample differently with a high confidence, then the data sample is determined to be an adversarial example.
-
18.
公开(公告)号:US20210034721A1
公开(公告)日:2021-02-04
申请号:US16529882
申请日:2019-08-02
Applicant: NXP B.V.
Inventor: Joppe Willem Bos , Simon Johann Friedberger , Nikita Veshchikov , Christine van Vredendaal
Abstract: A method and data processing system are provided for determining if a machine learning model has been copied. The machine learning model has a plurality of nodes, the plurality of nodes is organized as a plurality of interconnected layers, and the plurality of interconnected layers includes an input layer and an output layer. The output layer has a predetermined number of output nodes for classifying input samples into a predetermined number of categories, where each output node corresponds to a category. An additional watermarking node is added to the output layer. The model is trained to classify the input data into the predetermined number of categories and into an additional category for the additional node. The additional node may be added to another model to determine if the another model is a copy or clone of the ML model.
-
公开(公告)号:US20240430099A1
公开(公告)日:2024-12-26
申请号:US18337795
申请日:2023-06-20
Applicant: NXP B.V.
Inventor: Christine van Vredendaal , Tobias Schneider , Melissa Azouaoui
Abstract: A secure processing system configured to produce a hash based digital signature of a message, including: random number generator (RNG); a monotonic counter device configured to produce a monotonically increasing counter value; a hash accelerator configured to produce a hash of the message based upon a random number from the RNG and the counter value; and a run time integrity check (RTIC) device configured to check the integrity of the operation of the hash accelerator based upon the counter value.
-
公开(公告)号:US20240388429A1
公开(公告)日:2024-11-21
申请号:US18319982
申请日:2023-05-18
Applicant: NXP B.V.
Inventor: Christine van Vredendaal , Melissa Azouaoui , Marcel Medwed , Tobias Schneider
Abstract: A data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for generating keys in a hash based signature system in a processor, the instructions, including: generating, by a random number generator, a seed; repeatedly hashing the seed with a first hash function to produce n/k chained seeds, wherein n is a total number secret keys generated and k is a number of secret keys generated from each chained seed; and generating k secret keys from each of the n/k chained seeds using a second hash function, wherein at least one of the k secret keys is generated from another of the k secret keys in a sequential chain.
-
-
-
-
-
-
-
-
-