Cryptography Research Announces License Agreement for Differential Power Analysis Countermeasures Patents with Renesas Technology
SAN FRANCISCO, CALIFORNIA, UNITED STATES - September 17, 2008 – Cryptography Research Inc. (CRI) today announced an agreement with Renesas Technology Corp. regarding the use of CRI’s patents to enhance the security of tamper-resistant smart card chips against Differential Power Analysis (DPA) and related attacks.
Renesas has the freedom to use CRI's patents as part of its strategy to develop and enhance its secure chips and related software for smart cards and other security-conscious applications. The license also covers software executing on Renesas chips, allowing Reneasas’ customers to develop their own security countermeasures without a separate license from CRI.
“Renesas is one of the leading international semiconductor device manufacturers and has a track-record of offering intelligent microchip solutions to its customers” said Kit Rodgers, Vice President of Licensing at CRI. “We are pleased that Renesas licensed our patents to help with their ongoing efforts to produce state-of-the-art security chips for smart cards and other applications.”
DPA is a form of attack that involves monitoring the fluctuating electrical power consumption of a target device and then using advanced statistical methods to derive cryptographic keys and other secrets. Strong countermeasures to DPA help protect keys contained in tamper-resistant devices, such as smart cards or electronic IDs, which may be used in banking, pay television, mass transit, secure ID, wireless telecommunications, and other industries.
Cryptography Research has been awarded a portfolio of patents covering countermeasures to DPA attacks, including U.S. patents #6,278,783; #6,298,442; #6,304,658; #6,327,661; #6,381,699; #6,510,518; #6,539,092; #6,654,884 and other US and international patents pending.
About Cryptography Research, Inc.
Cryptography Research, Inc. provides technology and services to solve complex security problems. In addition to security evaluation and applied engineering work, CRI is actively involved in long-term research in areas including tamper resistance, content protection, network security and financial services. The company has a broad portfolio of patents covering countermeasures to differential power analysis and other vulnerabilities, and is committed to helping companies produce secure smart cards and other tamper resistant devices. Security systems designed by Cryptography Research engineers annually protect more than $100 billion of commerce for wireless, telecommunications, financial, digital television and Internet industries. For additional information please visit www.cryptography.com.
|
Related News
- Cryptography Research Announces License Agreement with Broadcom for Differential Power Analysis Countermeasures Patents
- Cryptography Research and Athena Announce Developer Ecosystem Agreement for Differential Power Analysis Countermeasures Patents
- Cryptography Research and Tiempo Announce Agreement for Differential Power Analysis Countermeasures Patents
- Cryptography Research and IP Cores Announce Agreement for Differential Power Analysis Countermeasures Patents
- Cryptography Research and Infineon Technologies Sign License Agreement For Differential Power Analysis Countermeasures
Breaking News
- JEDEC® and Industry Leaders Collaborate to Release JESD270-4 HBM4 Standard: Advancing Bandwidth, Efficiency, and Capacity for AI and HPC
- BrainChip Gives the Edge to Search and Rescue Operations
- ASML targeted in latest round of US tariffs
- Andes Technology Celebrates 20 Years with New Logo and Headquarters Expansion
- Creonic Unveils Bold Rebrand to Drive Innovation in Communication Technologies
Most Popular
- Cadence to Acquire Arm Artisan Foundation IP Business
- AMD Achieves First TSMC N2 Product Silicon Milestone
- Why Do Hyperscalers Design Their Own CPUs?
- Siemens to accelerate customer time to market with advanced silicon IP through new Alphawave Semi partnership
- New TSN-MACsec IP core for secure data transmission in 5G/6G communication networks
![]() |
E-mail This Article | ![]() |
![]() |
Printer-Friendly Page |