Search Results - ruby+lee

14 Results Sort By:
Modified Green Tea Polyphenol EGCG and EGCG-ester Inhibit Endospores
Modified Green Tea Polyphenol EGCG and EGCG-ester Inhibit EndosporesResearchers at Augusta University have invented skin-friendly compositions and methods for killing, inactivating, or otherwise reducing the bacterial endospores by using an effective amount of the green tea EGCG or its derivatives. EGCG research shows clear application for a hand sanitizer...
Published: 4/21/2023   |   Inventor(s): Stephen Hsu, Lee Lee, Tin-Chun Chu
Keywords(s):  
Category(s): Therapeutics
An Architecture for Security Health Monitoring and Attestation in Cloud Computing
Princeton Docket # 15-3171-1Researchers at Princeton University, Department of Electrical Engineering, have developed a distributed architecture to monitor and attest the security health of cloud customers' virtual machines (VMs) in a cloud computing system.Cloud providers want to monitor VMs to provide a secure and efficient computing environment to...
Published: 7/7/2023   |   Inventor(s): Ruby Lee, Tianwei Zhang
Keywords(s): computers/software, cyber security, data security
Category(s): Computer Science and Information Technology
Random Fill Caching for Secure Caches
Princeton Docket # 15-3105-1Researchers at Princeton University, Department of Electrical Engineering, have developed a new cache fill strategy and cache architecture to secure the existing processor cache to prevent information leakage through cache side-channel attacks.Correctly functioning caches have been shown to leak critical secrets like encryption...
Published: 12/21/2022   |   Inventor(s): Ruby Lee, Fangfei Liu
Keywords(s):  
Category(s): Computer Science and Information Technology
Subword Permutation Instructions for Re-ordering Subwords in Multiple Registers in Processors
Princeton Docket #00-1712-1 The method and system provides a set of permutation primitives for current and future 2-D multimedia programs which are based on decomposing images and objects into atomic units, then finding the permutations desired for the atomic units. The subword permutation instructions for these 2-D building blocks are also defined...
Published: 3/21/2024   |   Inventor(s): Ruby Lee
Keywords(s): computers/software
Category(s): Computer Science and Information Technology
Method and System for Performing Permutations with Bit Permutation Instructions
Princeton Docket #00-1709-1 The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. PPERM and PPERM3R instructions are defined to perform permutations by a sequence of instructions with each sequence...
Published: 3/21/2024   |   Inventor(s): Ruby Lee, Zhijie Shi
Keywords(s): computers/software, cryptography, data security
Category(s): Computer Science and Information Technology
Fast Permutation Instructions for Processors based on the Butterfly Network (Cross Instruction)
Princeton Docket #00-1711-1 The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. The permute instructions are based on a Benes network comprising two butterfly networks of the same size connected...
Published: 3/21/2024   |   Inventor(s): Ruby Lee, Xiao Yang, Manish Vachharajani
Keywords(s): computers/software, cryptography, data security
Category(s): Computer Science and Information Technology
OMFLIP - Fast Permutation Instruction for Processor based on Omega and Flip Networks
Princeton Docket #00-1710-1 The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. The permute instructions are based on an omega-flip network comprising at least two stages in which each stage can...
Published: 3/21/2024   |   Inventor(s): Ruby Lee, Xiao Yang
Keywords(s): computers/software, cryptography, data security
Category(s): Computer Science and Information Technology
System and Method for Processor-Based Security
Princeton Docket #09-2533-1 A system and method for processor-based security is provided, for on-chip security and trusted computing services for software applications. Secure execution environments (compartments or enclaves) are provided for executing trusted software by a secure processor and a trusted hypervisor. Secure memory and secure storage...
Published: 2/28/2024   |   Inventor(s): Ruby Lee, David Champagne
Keywords(s): computers/software
Category(s): Computer Science and Information Technology
A New Design of Cache Memory in Computers that Improves Performance and Security
Princeton Docket #09-2526-1The invention is a new method of designing cache memories used in computers. It achieves best-in-class performance for various performance metrics, previously achievable only by different conventional cache architectures. In particular, it combines benefits of Fully-Associative caches and Direct-Mapped caches, in a novel way...
Published: 3/26/2024   |   Inventor(s): Ruby Lee, Zhenghong Wang
Keywords(s): computers/software, data security, microprocessor
Category(s): Computer Science and Information Technology
A General-Purpose Parallel Read Functional Unit That Can Accelerate Software AES Encryption and Decryption. Parallel Read Functional Unit for Microprocessor
Princeton Docket #09-2534-1This invention proposes a new functional unit to store constants and tables, and new instructions that can read multiple constants in parallel, to speed up the software processing of various algorithms, including the AES encryption and decryption algorithms. AES is the NIST’s Advanced Encryption Standard (AES) which...
Published: 3/30/2022   |   Inventor(s): Ruby Lee, Yu-Yuan Chen
Keywords(s): computers/software, cyber security, data security, microprocessor
Category(s): Computer Science and Information Technology
1 2