Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_6bd4720aefb28835b9bfc5ff805f891b |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2123 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-08 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30181 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-85 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30101 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0625 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3836 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3001 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-755 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-321 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-003 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-38 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-10 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-06 |
filingDate |
2011-07-26-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_827a7128e59d00094a9240e26ebca533 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_9093ac1ff1ea099af185064b4b02ee57 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_1b9973a1ac116b36a27c8e8a85971c9e |
publicationDate |
2011-11-24-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
JP-2011239461-A |
titleOfInvention |
Cryptographic architecture with instruction masks and other techniques that interfere with differential power analysis |
abstract |
An apparatus and method for preventing an information leakage attack using timeline alignment. Randomly changing the amount of time required to determine a lookup table address; one access of at least one lookup table and subsequent access of another lookup table; By providing a process that randomly changes the amount of time that occurs between them, it is random so that the attacker cannot perform temporal alignment of leaked information to allow the attacker to decrypt Insert a number of instructions into the encryption algorithm. [Selection] Figure 3 |
priorityDate |
2004-06-08-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |