EP2222012 - Method and device for countering fault attacks [Right-click to bookmark this link] | Status | The application has been withdrawn Status updated on 27.01.2017 Database last updated on 14.06.2024 | Most recent event Tooltip | 27.01.2017 | Withdrawal of application | published on 01.03.2017 [2017/09] | Applicant(s) | For all designated states Thomson Licensing 1-5, rue Jeanne d'Arc 92130 Issy-les-Moulineaux / FR | [2010/34] | Inventor(s) | 01 /
Joye, Marc 1-5 rue Jeanne d'Arc 92443, Issy Les Moulineaux / FR | [2010/34] | Representative(s) | Huchet, Anne, et al TECHNICOLOR 1-5, rue Jeanne d'Arc 92130 Issy-les-Moulineaux / FR | [N/P] |
Former [2014/11] | Huchet, Anne, et al TECHNICOLOR European Patent Operations 1-5, rue Jeanne d'Arc 92443 Issy-les-Moulineaux Cedex / FR | ||
Former [2010/34] | Ruellan-Lemonnier, Brigitte Technicolor 1-5 rue Jeanne d'Arc 92130 Issy-les-Moulineaux / FR | Application number, filing date | 10153606.8 | 15.02.2010 | [2010/34] | Priority number, date | EP20090305162 | 19.02.2009 Original published format: EP 09305162 | [2010/34] | Filing language | EN | Procedural language | EN | Publication | Type: | A1 Application with search report | No.: | EP2222012 | Date: | 25.08.2010 | Language: | EN | [2010/34] | Search report(s) | (Supplementary) European search report - dispatched on: | EP | 04.05.2010 | Classification | IPC: | H04L9/30 | [2010/34] | CPC: |
H04L9/004 (EP,US);
H04L9/302 (EP,US)
| Designated contracting states | AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LI, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, SE, SI, SK, SM, TR [2010/34] | Extension states | AL | Not yet paid | BA | Not yet paid | RS | Not yet paid | Title | German: | Verfahren und Vorrichtung zur Bekämpfung von Fehlerangriffen | [2010/34] | English: | Method and device for countering fault attacks | [2010/34] | French: | Procédé et dispositif pour contrer des attaques de défauts | [2010/34] | Examination procedure | 04.02.2011 | Amendment by applicant (claims and/or description) | 04.02.2011 | Examination requested [2011/11] | 19.01.2017 | Application withdrawn by applicant [2017/09] | Fees paid | Renewal fee | 23.02.2012 | Renewal fee patent year 03 | 21.02.2013 | Renewal fee patent year 04 | 21.02.2014 | Renewal fee patent year 05 | 20.02.2015 | Renewal fee patent year 06 | 25.02.2016 | Renewal fee patent year 07 |
Opt-out from the exclusive Tooltip competence of the Unified Patent Court | See the Register of the Unified Patent Court for opt-out data | ||
Responsibility for the accuracy, completeness or quality of the data displayed under the link provided lies entirely with the Unified Patent Court. | Documents cited: | Search | [Y]US2008144814 (VILLEGAS KARINE [FR], et al) [Y] 1-6 * paragraph [0017] - paragraph [0185] *; | [A]US2005084096 (JOYE MARC [FR], et al) [A] 1-6 * paragraph [0043] - paragraph [0096] *; | [Y] - MARC JOYE ED - LIQUN CHEN ET AL, RSA Moduli with a Predetermined Portion: Techniques and Applications, INFORMATION SECURITY PRACTICE AND EXPERIENCE; [LECTURE NOTES IN COMPUTER SCIENCE], SPRINGER BERLIN HEIDELBERG, BERLIN, HEIDELBERG, PAGE(S) 116 - 130, (20070507), ISBN 9783540791034, XP019088340 [Y] 1-6 * page 117 - page 121 * | [A] - LENSTRA A K, "Generating RSA moduli with a predetermined portion", LECTURE NOTES IN COMPUTER SCIENCE, SPRINGER, DE LNKD- DOI:10.1007/3-540-49649-1_1, (19981001), no. 1514, ISSN 0302-9743, pages 1 - 10, XP002108059 [A] 1-6 * the whole document * DOI: http://dx.doi.org/10.1007/3-540-49649-1_1 | by applicant | US2008144814 | US2005084096 | - Lecture Notes in Computer Science, SPRINGER, (2002), vol. 2523, pages 260 - 275 | - "A New CRT-RSA Algorithm Secure Against Bellcore Attack", J. B16MER; M. OTTO; J-P. SEIFERT., 10th ACM Conference on Computer and Communication Security, ACM PRESS, (2003), pages 311 - 320 | - M. CIET; M. JOYE, "Practical Fault Countermeasures for Chinese Remaindering Based RSA. In 2nd Workshop Fault Diagnosis and Tolerance", CRYPTOGRAPHY - FDTC 2005, (2005), pages 124 - 132 | - "How Can We Overcome Both Side Channel Analysis and Fault Attacks on RSA-CRT?", C.H. KIM; J.-J. QUISQUATER, 4th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2007, IEEE COMPUTER SOCIETY PRESS, (2007), pages 21 - 29 | - "RSA Moduli with a Predetermined Portion: Techniques and Applications", MARC JOYE ET AL., Information Security Practice and Experience; Lecture Notes in Computer Science, SPRINGER, (20070507), pages 116 - 130 | - "Generating RSA Moduli with a predetermined portion", LENSTRA A K, Lecture Notes in Computer Science, SPRINGER, (19981001), pages 1 - 10 |