Generated by GPT-5-mini| Cryptography Research | |
|---|---|
| Name | Cryptography Research |
| Industry | Semiconductor security |
| Founded | 1998 |
| Founder | Paul Kocher |
| Headquarters | San Francisco, California |
| Products | Hardware security modules, secure microcontrollers, DPA countermeasures |
| Parent | Rambus (acquired 2011) |
Cryptography Research is a company and research group specializing in hardware and applied cryptography, integrated circuit security, and side‑channel analysis. It was founded to commercialize technologies for tamper resistance, randomness generation, and anti‑counterfeiting and has influenced standards, litigation, and industrial adoption across semiconductor and payment sectors.
Founded in 1998 by Paul Kocher after work related to SSL and the RSA algorithm, Cryptography Research operated alongside institutions such as Stanford University, MIT, UC Berkeley, Carnegie Mellon University, and research groups connected with DARPA and NSA. Early collaborations and citations involved figures and entities like Ron Rivest, Adi Shamir, Leonard Adleman, Tim Berners-Lee, David Chaum, Whitfield Diffie, Martin Hellman, Bruce Schneier, and companies including Intel Corporation, IBM, Nokia, Sony, and Visa Inc.. The firm's acquisition by Rambus in 2011 linked it to corporate disputes and standards controversies that touched on cases and regulators such as Federal Trade Commission, United States District Court for the Northern District of California, European Commission, International Organization for Standardization, and litigation involving Micron Technology and Samsung Electronics.
Research activities built on mathematical foundations contributed by Euclid, Pierre de Fermat, Carl Friedrich Gauss, and modern theorists including Claude Shannon, Alan Turing, Shafi Goldwasser, Silvio Micali, Oded Goldreich, Moni Naor, Ronald Rivest, Adi Shamir, and Leonard Adleman. Work referenced complexity classes and hardness assumptions studied by researchers at Princeton University, Harvard University, Yale University, Cornell University, and ETH Zurich with links to concepts pioneered in texts by Andrew Yao, Leslie Lamport, Michael Rabin, Mihalis Yannakakis, and Jack Edmonds. Foundational cryptanalysis and proofs connected to results from conferences like CRYPTO, EUROCRYPT, ASIACRYPT, RSA Conference, IEEE Symposium on Security and Privacy, and ACM CCS where contributors such as Victor Shoup, Phillip Rogaway, Taher Elgamal, Neal Koblitz, and Niels Ferguson have presented.
Applied work addressed implementation of algorithms attributed to Rivest–Shamir–Adleman, Elliptic Curve Cryptography, Diffie–Hellman key exchange, Advanced Encryption Standard, Blowfish, Twofish, IDEA, and signature schemes linked with Digital Signature Algorithm and Elliptic Curve Digital Signature Algorithm. Protocol development referenced standards bodies such as IETF, IEEE, NIST, ITU, and ISO and interoperability efforts tied to products from Microsoft, Apple Inc., Google, ARM Holdings, and Samsung Electronics. Contributions engaged with lattice‑based proposals from researchers like Oded Regev, hash constructions from Ronald Rivest, and authenticated encryption discussions promoted at workshops alongside authors such as Philippe Morain, Daniel J. Bernstein, and Tanja Lange.
Products and techniques were deployed in payment systems used by Visa Inc., Mastercard, American Express, and point‑of‑sale platforms integrated by Ingenico Group and Verifone. Other deployments addressed content protection for entertainment ecosystems involving Sony, Netflix, Warner Bros., and set‑top vendors like Cisco Systems and Humax. Supply‑chain and anti‑counterfeiting efforts intersected with manufacturers including ARM Holdings, Qualcomm, Broadcom, and institutional adopters such as European Central Bank and national mints like United States Mint and Royal Mint. Research outputs influenced standards for mobile telephony created by 3GPP, payment cards governed by EMVCo, and authentication schemes used by FIDO Alliance.
Technical work emphasized side‑channel analysis and countermeasures such as differential power analysis and fault injection studied in labs at UC San Diego, University College London, Ecole Polytechnique Fédérale de Lausanne, and Delft University of Technology. Collaborations and citations involved analysts like Paul Kocher, Jean‑Jacques Quisquater, Kocher, Jaffe, Jun, and evaluations using equipment from Keysight Technologies, Tektronix, and testing facilities tied to NIST. Security evaluations influenced certifications and schemes like Common Criteria, FIPS 140, Payment Card Industry Data Security Standard, and accreditation bodies such as National Institute of Standards and Technology and European Union Agency for Cybersecurity. Incident analyses cited breaches and responses related to companies such as Target Corporation, Equifax, Sony Pictures Entertainment, and study cases from Stuxnet and WannaCry.
Engagement with policy stakeholders included interactions with regulators like Federal Trade Commission, Congress of the United States, European Commission, and advisory bodies such as National Academies of Sciences, Engineering, and Medicine and World Economic Forum. Ethical discussions referenced debates involving advocates and scholars such as Bruce Schneier, Cory Doctorow, Lawrence Lessig, Timothy Gowers, and institutions including Electronic Frontier Foundation, Center for Democracy & Technology, and Open Rights Group. Policy impacts were evident in testimony and standards dialogues affecting legislation like the USA PATRIOT Act, rulings from the United States Supreme Court, and multilateral frameworks examined at forums like G20 and OECD.