http://rdf.ncbi.nlm.nih.gov/pubchem/patent/JP-2011239461-A

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_6bd4720aefb28835b9bfc5ff805f891b
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2123
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-08
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30181
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-85
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30101
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0625
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3836
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3001
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-755
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-321
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-003
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-38
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-10
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-30
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-06
filingDate 2011-07-26-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_827a7128e59d00094a9240e26ebca533
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_9093ac1ff1ea099af185064b4b02ee57
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_1b9973a1ac116b36a27c8e8a85971c9e
publicationDate 2011-11-24-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber JP-2011239461-A
titleOfInvention Cryptographic architecture with instruction masks and other techniques that interfere with differential power analysis
abstract An apparatus and method for preventing an information leakage attack using timeline alignment. Randomly changing the amount of time required to determine a lookup table address; one access of at least one lookup table and subsequent access of another lookup table; By providing a process that randomly changes the amount of time that occurs between them, it is random so that the attacker cannot perform temporal alignment of leaked information to allow the attacker to decrypt Insert a number of instructions into the encryption algorithm. [Selection] Figure 3
priorityDate 2004-06-08-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID512737
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID6862
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID30140
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID12747
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID365842
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID12748
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID1195
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID9894
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID850950
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419490476
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID301434
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID613808
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID1196
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID78989
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID490427
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID558981
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID425060
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID10229
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID457364
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID100858576
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID459865

Total number of triples: 54.