Method for securely checking a code
A reliable and verifier technology, which is applied in the direction of response error generation, redundant code error detection, attack encryption mechanism countermeasures, etc., can solve the problem that the known code verifier does not resist attacks, etc., to improve protection and avoid The effect of false attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The invention is schematically illustrated with the aid of an embodiment in the drawing and is described in detail below with reference to the drawing.
[0038] figure 1 An embodiment of a mask generator is shown schematically, which is denoted overall by the reference numeral 100 . The mask generator 100 is used to form a bit vector with 128 bits from the input signal 102 . To this end, circuit arrangement 100 includes four devices 104 , 106 , 108 and 110 , which each include 16 conversion elements TE_0 , TE_1 , TE_2 , . . . , TE_15 . For clarity, the figure 1 Only 4 of the 16 conversion elements TE_0, TE_1, TE_2, . . . , TE_15 are shown in each case. In this implementation, the mask generator 100 is configured such that each conversion element TE_0, TE_1, TE_2, . . . 102. Importantly, in each device 104, 106, 108 and 110 all transformation elements TE_0, TE_1, TE_2, . . . are different from each other.
[0039] Transformation elements TE_0 , TE_1 , TE_2 , . . ....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 