http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2013116916-A1

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_35398726ac7f92470e7099fa9ce91924
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_f8dcd4bd52e518e31e7517cfd8f6c881
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_da58c3211f340c0cf87de7d676e9d3ee
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-16
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0841
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F7-72
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F7-58
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3066
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0869
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-30
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F7-58
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F7-72
filingDate 2012-02-09-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_20aac7a6b32f74ff6efa6c5328458a65
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_03cb9b8a9989c1fe8416122467b17acb
publicationDate 2013-08-15-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2013116916-A1
titleOfInvention System and method for generating and protecting cryptographic keys
abstract In the present disclosure, implementations of Diffie-Hellman key agreement are provided that, when embodied in software, resist extraction of cryptographically sensitive parameters during software execution by white-box attackers. Four embodiments are taught that make extraction of sensitive parameters difficult during the generation of the public key and the computation of the shared secret. The embodiments utilize transformed random numbers in the derivation of the public key and shared secret. The traditional attack model for Diffie-Hellman implementations considers only black-box attacks, where attackers analyze only the inputs and outputs of the implementation. In contrast, white-box attacks describe a much more powerful type of attacker who has total visibility into the software implementation as it is being executed.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2016209939-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-3493460-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2018167198-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110663215-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11316671-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-3376705-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11290272-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11394525-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2019106166-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11201725-B2
priorityDate 2012-02-09-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-6668325-B1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2011120125-A1
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID127811870
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID242935217
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID245348577
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID183809
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID183809

Total number of triples: 39.