Tel Aviv, Israel

Yuval Yoskovits


Average Co-Inventor Count = 3.0

ph-index = 1


Company Filing History:


Years Active: 2025

where 'Filed Patents' based on already Granted Patents

1 patent (USPTO):

Title: Yuval Yoskovits: Innovator in Low Latency Block Cipher Technology

Introduction

Yuval Yoskovits is a prominent inventor based in Tel Aviv, Israel. He has made significant contributions to the field of data encryption, particularly in the development of low latency block cipher technology. His innovative work has implications for the efficiency and security of memory devices.

Latest Patents

Yuval Yoskovits holds a patent for a "Low latency block cipher in memory devices." This patent describes a storage device that includes multiple memory dies and a controller configured to encrypt a data block using a key schedule. The process involves generating a plurality of round keys from an encryption key, resulting in an encrypted data block. The controller modifies a key register during the encryption process and stores the final state of the key register as a decryption key. This technology enhances the efficiency of data encryption and decryption in memory devices.

Career Highlights

Yuval Yoskovits is associated with Sandisk Technologies Inc., where he has been instrumental in advancing storage technology. His expertise in encryption algorithms has positioned him as a key player in the development of secure memory solutions. His innovative approach has led to the creation of technologies that improve data security and access speed.

Collaborations

Yuval has collaborated with notable colleagues, including Yan Dumchin and Tzvi Alon. These partnerships have fostered a creative environment that encourages the development of cutting-edge technologies in the field of data storage and encryption.

Conclusion

Yuval Yoskovits is a distinguished inventor whose work in low latency block cipher technology has made a significant impact on the field of data security. His contributions continue to shape the future of memory devices and encryption methods.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…