Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_6bd4720aefb28835b9bfc5ff805f891b |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-08 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2123 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0625 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30101 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-321 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-755 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3001 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-85 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3836 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-003 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30181 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-38 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-06 |
filingDate |
2013-04-18-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_827a7128e59d00094a9240e26ebca533 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_1b9973a1ac116b36a27c8e8a85971c9e http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_9093ac1ff1ea099af185064b4b02ee57 |
publicationDate |
2013-08-29-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
JP-2013167897-A |
titleOfInvention |
Cryptographic architecture with instruction masks and other techniques that interfere with differential power analysis |
abstract |
An apparatus and method for preventing security leakage when a differential power analysis (DPA) attack is used in a smart card or the like. Randomization of access order to 8 SP boxes of DES encryption, and random number pseudo random instructions are inserted into SP box entry address calculation subroutine to input and output SP boxes The possibility of a successful DPA attack is reduced by modifying the timeline relationship. [Selection] Figure 3 |
priorityDate |
2004-06-08-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |