Vienna, Austria

Michael Hutter

USPTO Granted Patents = 5 

Average Co-Inventor Count = 3.0

ph-index = 1


Company Filing History:


Years Active: 2024-2025

Loading Chart...
5 patents (USPTO):

Title: Michael Hutter: Innovator in Cryptography

Introduction

Michael Hutter is a prominent inventor based in Vienna, Austria. He has made significant contributions to the field of cryptography, holding a total of five patents. His work focuses on enhancing the security of cryptographic algorithms through innovative hardware implementations.

Latest Patents

One of Hutter's latest patents is titled "Share domain arrangements for masked hardware implementations." This invention addresses the challenge of power analysis attacks by utilizing hardware masking techniques. The method involves probabilistically splitting each bit of a computation into multiple shares, thereby decoupling secret values from intermediate values. The design of mask-share domains is crucial, as they are physically spaced to minimize coupling, which can compromise security. Additionally, Hutter has developed functions that incorporate a pre-charge operation and an evaluation operation, allowing for efficient cryptographic processing.

Career Highlights

Hutter's career is marked by his role at Cryptography Research, Inc., where he has been instrumental in advancing cryptographic technologies. His expertise in hardware implementations has positioned him as a key figure in the industry, contributing to the development of secure systems.

Collaborations

Throughout his career, Hutter has collaborated with notable colleagues, including Helena Handschuh and Scott C Best. These partnerships have fostered innovation and have been essential in driving forward the research and development of cryptographic solutions.

Conclusion

Michael Hutter's contributions to cryptography through his innovative patents and collaborations highlight his importance in the field. His work continues to influence the development of secure hardware implementations, ensuring the integrity of cryptographic processes.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…