http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-1215843-A3
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_b452283384de8cf634b663c79a7c99e7 |
classificationCPCAdditional | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-24 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-125 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0625 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-06 |
filingDate | 2001-11-02^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_6d7da990402862baff598f0ca35fd499 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_6c66956b7f1761aef8a66fd89850a347 |
publicationDate | 2003-10-15^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | EP-1215843-A3 |
titleOfInvention | Methods and apparatus for implementing a cryptography engine |
abstract | Methods and apparatus are provided for implementing a cryptographynengine for cryptography processing. A variety of techniques are described. Ancryptography engine such as a DES engine can be decoupled from surrounding logicnby using asynchronous buffers. Bit-sliced design can be implemented by movingnexpansion and permutation logic out of the timing critical data path. An XORnfunction can be decomposed into functions that can be implemented morenefficiently. A two-level multiplexer can be used to preserve a clock cycle duringncryptography processing. Key scheduling can be pipelined to allow efficient roundnkey generation. |
priorityDate | 2000-12-13^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Predicate | Subject |
---|---|
isDiscussedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID516892 http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID453034310 |
Showing number of triples: 1 to 16 of 16.