发明名称 |
Method and system for protecting execution of cryptographic hash functions |
摘要 |
A method of protecting the execution of a cryptographic hash function, such as SHA-256, in a computing environment where inputs, outputs and intermediate values can be observed. The method consists of encoding input messages so that hash function inputs are placed in a transformed domain, and then applying a transformed cryptographic hash function to produce an encoded output digest; the transformed cryptographic hash function implements the cryptographic hash function in the transformed domain. |
申请公布号 |
AU2011363942(B2) |
申请公布日期 |
2017.02.09 |
申请号 |
AU20110363942 |
申请日期 |
2011.03.31 |
申请人 |
Irdeto B.V. |
发明人 |
Emmett, Jonathan;Eisen, Philip Allan;Muir, James;Murdock, Daniel |
分类号 |
G06F21/00;G06F7/00 |
主分类号 |
G06F21/00 |
代理机构 |
|
代理人 |
|
主权项 |
|
地址 |
|