Princeton Docket #07-2385-1Researchers at Princeton University have developed a new design for shifters that utilizes Inverse Butterfly or Butterfly Routing Circuits. Princeton is currently seeking industrial collaborators to commercialize this technology.The design excels in its ability to perform permutations, so it can efficiently perform both existing...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, Yedidya Hilewitz
Keywords(s): baseband processor, communications, computers/hardware, cryptography, multimedia, steganography
Category(s): Computers and Software
|
Princeton Docket #00-1711-1
The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. The permute instructions are based on a Benes network comprising two butterfly networks of the same size connected...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, Xiao Yang, Manish Vachharajani
Keywords(s): computers/software, cryptography, data security
Category(s): Computers and Software
|
Princeton Docket #00-1710-1
The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. The permute instructions are based on an omega-flip network comprising at least two stages in which each stage can...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, Xiao Yang
Keywords(s): computers/software, cryptography, data security
Category(s): Computers and Software
|
Princeton Docket #00-1709-1
The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. PPERM and PPERM3R instructions are defined to perform permutations by a sequence of instructions with each sequence...
Published: 3/15/2018
|
Inventor(s): Ruby Lee, Zhijie Shi
Keywords(s): computers/software, cryptography, data security
Category(s): Computers and Software
|