期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm
1
作者 Jiahui Liu Lang Li +1 位作者 Di Li Yu Ou 《Computers, Materials & Continua》 SCIE EI 2024年第6期4641-4657,共17页
Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key de... Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key degeneration and slow evolution within populations.These challenges significantly hinder key recovery efforts.This paper proposes a screening correlation power analysis framework combined with a genetic algorithm,named SFGA-CPA,to address these issues.SFGA-CPA introduces three operations designed to exploit CPA characteris-tics:propagative operation,constrained crossover,and constrained mutation.Firstly,the propagative operation accelerates population evolution by maximizing the number of correct bytes in each individual.Secondly,the constrained crossover and mutation operations effectively address key degeneration by preventing the compromise of correct bytes.Finally,an intelligent search method is proposed to identify optimal parameters,further improving attack efficiency.Experiments were conducted on both simulated environments and real power traces collected from the SAKURA-G platform.In the case of simulation,SFGA-CPA reduces the number of traces by 27.3%and 60%compared to CPA based on multiple screening methods(MS-CPA)and CPA based on simple GA method(SGA-CPA)when the success rate reaches 90%.Moreover,real experimental results on the SAKURA-G platform demonstrate that our approach outperforms other methods. 展开更多
关键词 Side-channel analysis correlation power analysis genetic algorithm CROSSOVER MUTATION
下载PDF
Correlation power attack on a message authentication code based on SM3
2
作者 Ye YUAN Kai-ge QU +2 位作者 Li-jiWU Jia-weiMA Xiang-min ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期930-946,共17页
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec... Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure. 展开更多
关键词 HMAC-SM3 Side channel analysis correlation power attack Bit-wise chosen-plaintext
原文传递
C-Vine Pair Copula Based Wind Power Correlation Modelling in Probabilistic Small Signal Stability Analysis 被引量:3
3
作者 Jin Xu Wei Wu +1 位作者 Keyou Wang Guojie Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第4期1154-1160,共7页
The increasing integration of wind power generation brings more uncertainty into the power system. Since the correlation may have a notable influence on the power system,the output powers of wind farms are generally c... The increasing integration of wind power generation brings more uncertainty into the power system. Since the correlation may have a notable influence on the power system,the output powers of wind farms are generally considered as correlated random variables in uncertainty analysis. In this paper, the C-vine pair copula theory is introduced to describe the complicated dependence of multidimensional wind power injection, and samples obeying this dependence structure are generated. Monte Carlo simulation is performed to analyze the small signal stability of a test system. The probabilistic stability under different correlation models and different operating conditions scenarios is investigated. The results indicate that the probabilistic small signal stability analysis adopting pair copula model is more accurate and stable than other dependence models under different conditions. 展开更多
关键词 Monte Carlo simulation pair copula small signal stability wind power correlation
下载PDF
Dynamic inhomogeneous S-Boxes in AES: a novel countermeasure against power analysis attacks
4
作者 陈毅成 《High Technology Letters》 EI CAS 2008年第4期390-393,共4页
Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.Th... Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.The masking strategies in algorithm level view each S-Box as an independent moduleand mask them respectively,which are costly in size and power for non-linear characteristic of S-Boxes.The new method uses dynamic inhomogeneous S-Boxes instead of traditional homogeneous S-Boxes,andarranges the S-Boxes randomly.So the power and data path delay of substitution unit become unpre-dictable.The experimental results demonstrate that this scheme takes advantages of the circuit character-istics of various S-Box implementations to eliminate the correlation between crypto operation and power.Itneeds less extra circuits and suits resource constrained applications. 展开更多
关键词 advanced encryption standard (AES) substitution box (S-Box) correlation power analysis
下载PDF
Study on the chaotic behavior of mining rock seepage system 被引量:1
5
作者 Wan Shiwen Xu Jinhai Li Chong 《Mining Science and Technology》 EI CAS 2011年第6期755-759,共5页
One dimensional non-steady, non-Darcy flow of water in a rock stratum was reduced into a system described by six ordinary differential equations involving five controlling parameters. Through response computations and... One dimensional non-steady, non-Darcy flow of water in a rock stratum was reduced into a system described by six ordinary differential equations involving five controlling parameters. Through response computations and time series analysis, chaotic behavior in the reduced system was discussed in details. Firstly, the dynamical response of the reduced system under a set of parameters was calculated, and the power spectrum of the attractor was obtained through fast Lagrangian transformation; then the phase space was reconstructed by fixing embedding dimension to be 6 and delay time to range from 1 to 20, and the correlation dimension of the attractor was calculated based on the curves under the coordinates of logarithm of correlation integral vs. logarithm of covering radius; and lastly, the Lyapunov indices of the attractor were calculated by using Gram-Schmit's orthogonalization method. The results show that the power spectrum of the attractor is continuous; the correlation dimension of the attractor is equal to 2.36; among the Lyapunov indices, LE1, LE2, LE3 are positive, LE5, LE6 are negative, and LE4 fluctuates near zero. All the analysis indicates that there may exist chaos in the system of non-steady, non-Darcy flow. 展开更多
关键词 Non-Darcy flow Chaos power spectrum correlation dimension Lyapunov indices
下载PDF
Stochastic Economic Dispatch Based Optimal Market Clearing Strategy Considering Flexible Ramping Products Under Wind Power Uncertainties
6
作者 Haoyong Chen Jianping Huang +2 位作者 Zhenjia Lin Fanqi Huang Mengshi Li 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2024年第4期1525-1535,共11页
High penetration level of renewable energy has brought great challenges to operation of power systems,and use of flexible resources(FRs)is becoming increasingly important.Flexibility of power systems can be improved b... High penetration level of renewable energy has brought great challenges to operation of power systems,and use of flexible resources(FRs)is becoming increasingly important.Flexibility of power systems can be improved by changing generation arrangements,but the interests of some market participants may be harmed in the process.This study proposes a stochastic economic dispatch model with trading of flexible ramping products(FRPs).To calculate changes in revenue and reasonably compensate units that provide FRs,multisegmented marginal bidding for energy is simulated by linearizing generation cost,and an optimal market clearing strategy for FRPs is developed according to changes in clearing energy and marginal clearing price.Then,the correlation between prediction errors of wind speeds among different wind farms is determined based on a joint distribution function modeled by the copula function,and quasi-Monte Carlo simulation(QMC)is used to generate wind power scenarios.Finally,numerical simulations of modified IEEE-30 and IEEE-118 bus systems is performed with minimum comprehensive cost as the objective function.This verifies the proposed model could effectively deal with wind variability and uncertainty,stabilize the marginal clearing price of the electricity market,and ensure fairness in the market. 展开更多
关键词 Flexible ramping product marginal clearing price risk cost stochastic economic dispatch wind power correlation
原文传递
A Standard Cell-Based Leakage Power Analysis Attack Countermeasure Using Symmetric Dual-Rail Logic
7
作者 朱念好 周玉洁 刘红明 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第2期169-172,共4页
Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the lea... Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor. 展开更多
关键词 correlation power analysis cryptograph differential power analysis leakage power analysis(LPA) power analysis simple power analysis
原文传递
Enhancing non-profiled side-channel attacks by time-frequency analysis
8
作者 Chengbin Jin Yongbin Zhou 《Cybersecurity》 EI CSCD 2023年第4期50-75,共26页
Side-channel analysis(SCA)has become an increasing important method to assess the physical security of cryptographic systems.In the process of SCA,the number of attack data directly determines the performance of SCA.W... Side-channel analysis(SCA)has become an increasing important method to assess the physical security of cryptographic systems.In the process of SCA,the number of attack data directly determines the performance of SCA.With sufficient attack data,the adversary can achieve a successful SCA.However,in reality,the cryptographic device may be protected with some countermeasures to limit the number of encryptions using the same key.In this case,the adversary cannot use casual numbers of data to perform SCA.The performance of SCA will be severely dropped if the attack traces are insufficient.In this paper,we introduce wavelet scatter transform(WST)and short-time fourier transform(STFT)to non-profiled side-channel analysis domains,to improve the performance of side-channel attacks in the context of insufficient data.We design a practical framework to provide suitable parameters for WST/STFT-based SCA.Using the proposed method,the WST/STFT-based SCA method can significantly enhance the performance and robustness of non-profiled SCA.The practical attacks against four public datasets show that the proposed method is able to achieve more robust performance.Compared with the original correlation power analysis(CPA),the number of attack data can be reduced by 50–95%. 展开更多
关键词 correlation power analysis Side-channel analysis Proposed attack framework Wavelet scatter transform Short-time fourier transform
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部