http://rdf.ncbi.nlm.nih.gov/pubchem/patent/JP-2013167897-A

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_6bd4720aefb28835b9bfc5ff805f891b
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-08
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2123
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0625
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30101
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-321
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-755
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3001
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-85
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3836
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-003
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30181
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-38
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-30
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-06
filingDate 2013-04-18-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_827a7128e59d00094a9240e26ebca533
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_1b9973a1ac116b36a27c8e8a85971c9e
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_9093ac1ff1ea099af185064b4b02ee57
publicationDate 2013-08-29-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber JP-2013167897-A
titleOfInvention Cryptographic architecture with instruction masks and other techniques that interfere with differential power analysis
abstract An apparatus and method for preventing security leakage when a differential power analysis (DPA) attack is used in a smart card or the like. Randomization of access order to 8 SP boxes of DES encryption, and random number pseudo random instructions are inserted into SP box entry address calculation subroutine to input and output SP boxes The possibility of a successful DPA attack is reduced by modifying the timeline relationship. [Selection] Figure 3
priorityDate 2004-06-08-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/JP-H11165375-A
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID365842
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID301434
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID12748
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419490476
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID558981
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID100858576
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID6862
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID30140
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID490427
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID457364
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID1195
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID10229
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID425060
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID459865
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID512737
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID78989
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID850950
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID613808
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID1196
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID12747
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID9894

Total number of triples: 55.