期刊文献+
共找到65篇文章
< 1 2 4 >
每页显示 20 50 100
SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm
1
作者 Jiahui Liu Lang Li +1 位作者 Di Li Yu Ou 《Computers, Materials & Continua》 SCIE EI 2024年第6期4641-4657,共17页
Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key de... Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key degeneration and slow evolution within populations.These challenges significantly hinder key recovery efforts.This paper proposes a screening correlation power analysis framework combined with a genetic algorithm,named SFGA-CPA,to address these issues.SFGA-CPA introduces three operations designed to exploit CPA characteris-tics:propagative operation,constrained crossover,and constrained mutation.Firstly,the propagative operation accelerates population evolution by maximizing the number of correct bytes in each individual.Secondly,the constrained crossover and mutation operations effectively address key degeneration by preventing the compromise of correct bytes.Finally,an intelligent search method is proposed to identify optimal parameters,further improving attack efficiency.Experiments were conducted on both simulated environments and real power traces collected from the SAKURA-G platform.In the case of simulation,SFGA-CPA reduces the number of traces by 27.3%and 60%compared to CPA based on multiple screening methods(MS-CPA)and CPA based on simple GA method(SGA-CPA)when the success rate reaches 90%.Moreover,real experimental results on the SAKURA-G platform demonstrate that our approach outperforms other methods. 展开更多
关键词 Side-channel analysis correlation power analysis genetic algorithm CROSSOVER MUTATION
下载PDF
DESIGN OF DIFFERENTIAL POWER ANALYSIS RESISTANT CRYPTO CHIP BASED ON TIME RANDOMIZATION 被引量:1
2
作者 Ren Fang Yan Yingjian Fu Xiaobing 《Journal of Electronics(China)》 2010年第2期237-242,共6页
Differential Power Analysis (DPA) is an effective attack method to break the crypto chips and it has been considered to be a threat to security of information system. With analyzing the prin-ciple of resisting DPA,an ... Differential Power Analysis (DPA) is an effective attack method to break the crypto chips and it has been considered to be a threat to security of information system. With analyzing the prin-ciple of resisting DPA,an available countermeasure based on randomization is proposed in this paper. Time delay is inserted in the operation process and random number is precharged to the circuit during the delay time,the normal schedule is disturbed and the power is randomized. Following this meth-odology,a general DPA resistance random precharge architecture is proposed and DES algorithm following this architecture is implemented. This countermeasure is testified to be efficient to resist DPA. 展开更多
关键词 Differential power analysis (DPA) resistant Random precharge architecture Time randomization
下载PDF
Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks
3
作者 Nadia Mustaqim Ansari Rashid Hussain +1 位作者 Sheeraz Arif Syed Sajjad Hussain 《Computers, Materials & Continua》 SCIE EI 2022年第7期1861-1875,共15页
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the informat... The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the information by observing the power consumption,electromagnetic(EM)field,timing analysis,and acoustics of the device.Later,the attackers perform statistical functions to recover the key.Advanced Encryption Standard(AES)algorithm has proved to be a good security solution for constrained IoT devices.This paper implements a simulation model which is used to modify theAES algorithm using logicalmasking properties.This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES.This model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB simulator.Results will give better solution by hiding power profiles of the IoT devices against PAAs.In future,the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic(WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array(FPGA). 展开更多
关键词 Side channel attacks power analysis attacks network security MASKING advance encryption standard
下载PDF
Design of Feedback Shift Register of Against Power Analysis Attack
4
作者 Yongbin Zhao XuYang RanranLi 《Computers, Materials & Continua》 SCIE EI 2019年第2期517-527,共11页
Stream ciphers based on linear feedback shift register(LFSR)are suitable for constrained environments,such as satellite communications,radio frequency identification devices tag,sensor networks and Internet of Things,... Stream ciphers based on linear feedback shift register(LFSR)are suitable for constrained environments,such as satellite communications,radio frequency identification devices tag,sensor networks and Internet of Things,due to its simple hardware structures,high speed encryption and lower power consumption.LFSR,as a cryptographic primitive,has been used to generate a maximum period sequence.Because the switching of the status bits is regular,the power consumption of the LFSR is correlated in a linear way.As a result,the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks.In this paper,a new design of LFSR against power attacks is proposed.The power consumption characteristics of LFSR can be masked by using an additional LFSR and confused by adding a new filter Boolean function and a flip-flop.The design method has been implemented easily by circuits in this new design in comparison with the others. 展开更多
关键词 Stream cipher feedback shift register power analysis Boolean function
下载PDF
A Standard Cell-Based Leakage Power Analysis Attack Countermeasure Using Symmetric Dual-Rail Logic
5
作者 朱念好 周玉洁 刘红明 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第2期169-172,共4页
Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the lea... Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor. 展开更多
关键词 correlation power analysis cryptograph differential power analysis leakage power analysis(LPA) power analysis simple power analysis
原文传递
Key Recovery Against 3DES in CPU Smart Card Based on Improved Correlation Power Analysis 被引量:3
6
作者 Yanting Ren Liji Wu +4 位作者 Hexin Li Xiangyu Li Xiangmin Zhang An Wang Hongyi Chen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第2期210-220,共11页
The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the ... The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces. 展开更多
关键词 Triple Data Encryption Standard (3DES) CPU smart cards power analysis key recovery side-channeanalysis
原文传递
Sample size and power analysis for stepped wedge cluster randomised trials with binary outcomes
7
作者 Jijia Wang Jing Cao +1 位作者 Song Zhang Chul Ahn 《Statistical Theory and Related Fields》 2021年第2期162-169,共8页
In stepped wedge cluster randomised trials(SW-CRTs),clusters of subjects are randomly assigned to sequences,where they receive a specific order of treatments.Compared to conventional cluster randomised studies,one uni... In stepped wedge cluster randomised trials(SW-CRTs),clusters of subjects are randomly assigned to sequences,where they receive a specific order of treatments.Compared to conventional cluster randomised studies,one unique feature of SW-CRTs is that all clusters start from control and gradually transition to intervention according to the randomly assigned sequences.This feature mitigates the ethical concern of withholding an effective treatment and reduces the logistic burden of implementing the intervention at multiple clusters simultaneously.This feature,however,presents challenges that need to be addressed in experimental design and data analysis,i.e.,missing data due to prolonged follow-up and complicated correlation structures that involve between-subject and longitudinal correlations.In this study,based on the generalised estimating equation(GEE)approach,we present a closed-form sample size formula for SW-CRTs with a binary outcome,which offers great flexibility to account for unbalanced randomisation,missing data,and arbitrary correlation structures.We also present a correction approach to address the issue of under-estimated variance by GEE estimator when the sample size is small.Simulation studies and application to a real clinical trial are presented. 展开更多
关键词 Stepped wedge GEE clinical trials power analysis sample size
原文传递
POWER FLOW ANALYSIS AND APPLICATION SIMULATION OF ELECTROMAGNETIC CONTINUOUSLY VARIABLE TRANSMISSION 被引量:3
8
作者 LUO Yutao TAN Di MENG Fanzhen 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2008年第6期48-56,共9页
With the structure of two air gaps and two rotors, the electromagnetic continuously variable transmission(EMCVT) is a novel power-split continuously variable transmission(CVT). There are two kinds of power flowing... With the structure of two air gaps and two rotors, the electromagnetic continuously variable transmission(EMCVT) is a novel power-split continuously variable transmission(CVT). There are two kinds of power flowing through the EMCVT, one is mechanical power and the other is electric power. In the mean time, there are three power ports in the EMCVT, one is the outer rotor named mechanical power port and the other two are the inner rotor and the stator named electric power ports. The mechanical power port is connected to the driving wheels through the final gear and the electric ports are connected to the batteries through the transducers. The two kinds of power are coupled on the outer rotor of the EMCVT. The EMCVT can be equipped on the conventional vehicle being regarded as the CVT and it also can be equipped on the hybrid electric vehicle(HEV) as the multi-energy sources assembly. The power flows of these two kinds of applications are analysed. The back electromotive force(EMF) equations are illatively studied and so the dynamic mathematic model is theorized. In order to certify the feasibility of the above theories, three simulations are carried out in allusion to the above two kinds of mentioned applications of the EMCVT and a five speed automatic transmission(AT) vehicle. The simulation results illustrate that the efficiency of the EMCVT vehicles is higher than that of the AT vehicle owed to the optimized operation area of the engine. Hence the fuel consumption of the EMCVT vehicles is knock-down. 展开更多
关键词 Electromagnetic continuously variable transmission power flow analysis back electromotive force application simulation
下载PDF
Numerical Analysis of Magnetic-Shielding Effectiveness for Magnetic Resonant Wireless Power Transfer System 被引量:1
9
作者 卢伟国 李惠荣 +1 位作者 陈伟铭 刘黎辉 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第8期148-151,共4页
Magnetic radiation phenomena appear inevitably in the magnetic-resonance wireless power transfer (MR-WPT) system, and regarding this problem the magnetic-shielding scheme is applied to improve the electromagnetic pe... Magnetic radiation phenomena appear inevitably in the magnetic-resonance wireless power transfer (MR-WPT) system, and regarding this problem the magnetic-shielding scheme is applied to improve the electromagnetic performance in engineering. In this study, the shielding effectiveness of a two-coil MR-WPT system for different material shields is analyzed in theory using Moser's formula and Schelkunoff's formula. On this basis a candidate magnetic-shielding scheme with a double-layer structure is determined, which has better shielding effectiveness and coils coupling coefficient. Finally, some finite element simulation results validate the correctness of the theoretical analysis, and the shielding effectiveness with the double-layer shield in maximum is 30?dB larger than the one with the single-layer case. 展开更多
关键词 MR WPT Numerical analysis of Magnetic-Shielding Effectiveness for Magnetic Resonant Wireless power Transfer System
下载PDF
Analysis of Chinese Power Market in 2007 and Its Forecast
10
作者 Department of Development and Planning, State Grid Corporation, and State Power Economic Research Institute Jia Yulu 《Electricity》 2008年第2期41-45,共5页
Power supply and demand inJanuary-September, 2007Since 2007, the national economy developed continu-ously, showing a situation of rapid growth, more optimizedstructure, increased efficiency and improvement of people&#... Power supply and demand inJanuary-September, 2007Since 2007, the national economy developed continu-ously, showing a situation of rapid growth, more optimizedstructure, increased efficiency and improvement of people'slivelihood. In the first three quarters, GDP achieved 16.6043trillion Yuan, and its year-on-year growth rate was 11.5%; 展开更多
关键词 WILL analysis of Chinese power Market in 2007 and Its Forecast rate THAN
下载PDF
Basic Structure and Its Analysis of Nationwide Power System Interconnection
11
作者 Zeng Dewen 《Electricity》 2000年第3期11-17,共7页
关键词 WORK In Basic Structure and Its analysis of Nationwide power System Interconnection
下载PDF
Analysis of Contradiction Between Coal and Power Industry
12
作者 Huang Shaozhong Price and Finance Regulatory Department, State Electricity Regulatory Commission (SERC) ,Wang Ying 《Electricity》 2008年第4期22-26,共5页
At the beginning of 2008, the Central, East and South China suffered a rare snow and ice disaster. After the disaster, power generation and power grid enterprises faced a big problem of power coal supply.
关键词 In analysis of Contradiction Between Coal and power Industry
下载PDF
Analysis on the Situation of Power Supply and Demand in Shandong
13
作者 Sun Wei Department of Development Planning, Shandong Electric Power Corporation Jia Yulu 《Electricity》 2008年第1期40-42,共3页
In the first half of 2007, the power industry in Shandongprovince continued to maintain a rapid growth momentum.The gross electricity consumption amounted to 121.25 TWh,14.4% higher over that in the same period of las... In the first half of 2007, the power industry in Shandongprovince continued to maintain a rapid growth momentum.The gross electricity consumption amounted to 121.25 TWh,14.4% higher over that in the same period of last year. The totalinstalled capacity reached 53.29 GW. It was expected that bythe end of 2007, the gross electricity consumption in Shan-dong would reach 260 TWh, increasing by 14.4% on ayear-on-year basis; the maximum load would reach 40. 展开更多
关键词 analysis on the Situation of power Supply and Demand in Shandong HIGH
下载PDF
Analysis of Development of Nationwide Power Sources in 2007 and Forecast for 2008
14
作者 Wang Nan State Power Economic Research Institute 《Electricity》 2008年第2期46-48,共3页
Introduction With ever-increasing of power sources, the capabilityof power supply was further enforced in 2007. This met thestrong demand of national economy development. Restruc-turing of power sources was deepening,... Introduction With ever-increasing of power sources, the capabilityof power supply was further enforced in 2007. This met thestrong demand of national economy development. Restruc-turing of power sources was deepening, of which "substi-tuting large power units for small ones" started well, theinstalled capacity of wind power was doubled and obviousresults were achieved in the energy-conservation and pollu- 展开更多
关键词 analysis of Development of Nationwide power Sources in 2007 and Forecast for 2008
下载PDF
Analysis on Interconnection between North China and Shandong Power Networks
15
作者 Cao Yaling Li Lei 《Electricity》 2000年第3期26-30,共5页
关键词 analysis on Interconnection between North China and Shandong power Networks
下载PDF
Clustering Collision Power Attack on RSA-CRT 被引量:1
16
作者 Wunan Wan Jun Chen +3 位作者 Jinyue Xia Jinquan Zhang Shibin Zhang Hao Chen 《Computer Systems Science & Engineering》 SCIE EI 2021年第2期417-434,共18页
In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introd... In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introduced via chosen-message pairs.This attack method is that the key parameters dp and dq are segmented by byte,and the modular multiplication collisions are identified by k-means clustering.The exponents dp and dq were recovered by 12 power traces of six groups of the specific message pairs,and the exponent d was obtained.We also propose a second order clustering collision power analysis attack against RSA implementation with CRT,which applies double blinding exponentiation.To reduce noise and artificial participation,we analyze the power points of interest by preprocessing and k-means clustering with horizontal correlation collisions.Thus,we recovered approximately 91%of the secret exponents manipulated with a single power curve on RSA-CRT with countermeasures of double blinding methods. 展开更多
关键词 Collision attack power analysis attack chosen-message attack module exponentiation RSA-CRT
下载PDF
Analysis of the common model error on velocity field under Colored noise model by GPS and InSAR: A case study in the Nepal and everest region 被引量:2
17
作者 Wei Xu Gang Chen +3 位作者 Kaihua Ding Defang Yang Yanfa Si Xiaoying Yang 《Geodesy and Geodynamics》 CSCD 2022年第4期399-414,共16页
The accuracy of the velocity field will be affected by the noise model and common mode errors through GPS time series analysis.In order to analyze the influence of these two factors on the accuracy of the velocity fie... The accuracy of the velocity field will be affected by the noise model and common mode errors through GPS time series analysis.In order to analyze the influence of these two factors on the accuracy of the velocity field,two kinds of data are used,including the three-year observation from 20 permanent GPS stations with high spatial correlation in the Everest,which is about 650 km from north to south and 1068 km from east to west,and three-year 80 ascending images and 141 descending images from sentinel-1A,which are processed by GAMIT/GLOBK software and Small Baseline Subset-Interferometric Synthetic Aperture Radar method(SBAS-InSAR),respectively.The vertical deformation rate is solved by time series analysis through a self-made adaptive algorithm.In the analysis,the linear change rate,period,half period coefficient,and residual sequence of all stations are solved by using James L.Davis periodic model.The noise type of residual sequence is analyzed by the power spectrum model.The spatio-temporal correlated noise,Common Mode Error(CME),is extracted by the Principal Component Analysis(PCA)and Karhunen-Loeve(KLE)methods.The results show that noises can be best described by“flicker noise+white noise”model.After the removal of CME,the R^(2) estimates of all stations are above 0.8,with RMS value of velocity field decreasing from 1.428 mm/yr to 1.062 mm/yr and 1.063 mm/yr to 0.815 mm/yr,in N and E directions,respectively,indicating that the influence of CME can't be ignored in the extraction of the high-precision velocity field in the Nepal and Everest region. 展开更多
关键词 GPS time analysis SBAS-InSAR power spectrum analysis PCA KLE CME
下载PDF
AFM Analysis of TiN, TiAlN, and TiAlSiN Coatings Prepared by Cathodic Arc Ion Plating 被引量:4
18
作者 王文昌 ZHANG Ling 孔德军 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2016年第5期1093-1098,共6页
The TiN, TiAlN, and TiAlSiN coatings were prepared on YT14 cutting tool surface with CAIP(cathode arc ion plating), the surface morphologies and phases were analyzed with FESEM(field emission scanning electron micr... The TiN, TiAlN, and TiAlSiN coatings were prepared on YT14 cutting tool surface with CAIP(cathode arc ion plating), the surface morphologies and phases were analyzed with FESEM(field emission scanning electron microscopy), and XRD(X-ray diffraction), respectively, and the coating parameters such as 3D surface micro-topography, grain size, surface height, hierarchy, profile height, and power spectral density, etc, were measured with AFM(atomic force microscope). The results show that the phases of TiN, TiAlN, and TiAlSiN coatings are TiN, TiN+TiAlN, TiN+Si_3N_4+TiAlN, respectively, while the surface roughness Sa of TiN, TiAlN, and TiAlSiN coatings is 75.3, 98.9, and 42.1 nm, respectively, and the roughness depth Sk is 209, 389, and 54 nm, respectively, the sequence of average grain sizes is TiAlN〉TiN〉TiAlSiN. The surface bearing index Sbi of TiN, TiAlN, and TiAlSiN coatings is 0.884, 1.01, and 0.37, respectively, and the sequence of surface bearing capability is TiAlN〉TiN〉TiAlSiN. At the lower wavelength(102-103 nm), the power spectral densities have a certain correlation, and the sequence of TiN〉TiAlN〉TiAlSiN, while the correlation is low at the higher wavelength(〉103 nm). 展开更多
关键词 TiN TiAlN and TiAlSiN coatings AFM 3D surface micro-topography height analysis power spectral density
下载PDF
A Numerical Fluid Analysis for Early Nonlinear Mode Evolution of Fast Electron Beams in Dense Plasmas
19
作者 S.REHMAN 王晓钢 +2 位作者 刘健 雷奕安 刘悦 《Plasma Science and Technology》 SCIE EI CAS CSCD 2009年第6期661-665,共5页
Nonlinear mode evolution for relativistic electrons in dense plasmas is analyzed in a three-dimensional fluid approach. Similar to the results previously obtained in particle-in-cell simulations, it is found that obli... Nonlinear mode evolution for relativistic electrons in dense plasmas is analyzed in a three-dimensional fluid approach. Similar to the results previously obtained in particle-in-cell simulations, it is found that oblique modes dominate two-stream and filamentation modes in the linear stage. On the other hand a power spectrum analysis shows the nonlinear development of the high wavenumber modes. 展开更多
关键词 relativistic electron beams power spectrum analysis INSTABILITIES
下载PDF
Comparison between Fast Fourier Transform and Autoregressive Model on Analysis of Autonomic Nervous Function after Food Intake in Women
20
作者 Kumiko Ohara Yoshimitsu Okita +1 位作者 Katsuyasu Kouda Harunobu Nakamura 《Health》 CAS 2016年第6期567-574,共8页
Purpose: Heart rate variability (HRV) is acknowledged as a useful tool to estimate autonomic function. Fast Fourier transform (FFT) and autoregressive model (AR) are used for power spectral analysis of HRV. However, t... Purpose: Heart rate variability (HRV) is acknowledged as a useful tool to estimate autonomic function. Fast Fourier transform (FFT) and autoregressive model (AR) are used for power spectral analysis of HRV. However, there is little evidence of agreement between FFT and AR in relation to HRV following food intake in females. In the present study, we applied both FFT and AR after food intake during the follicular and luteal phases, and compared raw low-frequency (LF) and high- frequency (HF) powers, and LF/HF ratio obtained with the two power-spectral analytical methods. Methods: All subjects participated in two sessions: follicular phase session and luteal phase session. In each session, R-R intervals were continuously recorded before and after meals, and power spectral analysis of heart rate variability was performed. We analyzed low-frequency power (LF: 0.04 - 0.15 Hz) and high-frequency power (HF: 0.15 - 0.40 Hz) by using FFT and AR. LF and HF power were computed for each 30 sec, 1 min, 2.5 min, and 5 min of the 5-min R-R data before meal intake and at 20, 40, 60 and 80 min after meal intake. The LF/HF ratio was calculated as an index of sympathovagal balance. Results: In the present study, after 30 sec and 1 min of segment analysis, there was little interchangeability between AR and FFT in LF, HF, and LF/HF ratio in both follicular and luteal phases. In 2.5 min or 5 min of segment analysis, there was interchangeability between FFT and AR in LF and HF, but not in the LF/HF ratio in both follicular and luteal phases. Additionally, FFT underestimated HRV compared with AR, and the extent of underestimation increased with increasing AR value. Conclusion: FFT underestimated HRV compared with AR, and FFT correlated poorly with AR when the analysis segment was shortened. 展开更多
关键词 Heart Rate Variability power Spectral analysis Food Intake Females Menstrual Cycle
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部