http://rdf.ncbi.nlm.nih.gov/pubchem/patent/JP-5283735-B2

Outgoing Links

Predicate Object
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-08
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2123
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0625
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-321
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3836
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-003
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-3001
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-85
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-755
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30181
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-30101
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-38
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-30
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-10
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00
filingDate 2011-07-26-04:00^^<http://www.w3.org/2001/XMLSchema#date>
grantDate 2013-09-04-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationDate 2013-09-04-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber JP-5283735-B2
titleOfInvention Cryptographic architecture with instruction masks and other techniques that interfere with differential power analysis
abstract An apparatus and method for preventing information leakage attacks that utilize timeline alignment. The apparatus and method inserts a random number of instructions into an encryption algorithm such that the leaked information can not be aligned in time to allow an attacker to break the encryption.
priorityDate 2004-06-08-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID365842
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID459865
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID425060
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID10229
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419490476
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID1195
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID78989
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID558981
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID850950
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID490427
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID12748
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID30140
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID12747
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID6862
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID512737
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID613808
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID301434
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID1196
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID457364
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID9894
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID100858576

Total number of triples: 51.