This work deals with the power exponent 1rand 2r respectively of the maximal and second-maximal prime factors of the order of simple K4-group, and the classification for simple 4{5,7}K--group G (i.e. G can not be divi...This work deals with the power exponent 1rand 2r respectively of the maximal and second-maximal prime factors of the order of simple K4-group, and the classification for simple 4{5,7}K--group G (i.e. G can not be divided by 5 nor by 7 or ()Gp= 4 ), simple 5 -4K-group G (i.e. G can not divided by 5 and ()Gp=4) and simple 7-4K-group G (i.e. G can not divided by 7 and ()Gp= 4). It is derived that 1r =1, 2 and 4, and 2r is not greater than 4. All the simple 4K-groups with order 235,237abcdabcdpp and 2357abcd are obtained.展开更多
针对地铁无人值守车站信号设备房小型不间断电源(Uninterruptible Power Supply,UPS)因缺乏在线监测而导致故障影响大的问题,开展了基于5G和简单网络管理协议(Simple Network Management Protocol,SNMP)的小型UPS在线监测方法研究,对监...针对地铁无人值守车站信号设备房小型不间断电源(Uninterruptible Power Supply,UPS)因缺乏在线监测而导致故障影响大的问题,开展了基于5G和简单网络管理协议(Simple Network Management Protocol,SNMP)的小型UPS在线监测方法研究,对监测系统的原理及组成进行了详细的阐述,分析了SNMP协议的管理信息库(Management Information Base,MIB),并给出了MIB库的应用方法,运用5G技术进行数据传输,最后通过编制应用软件,实现了型号为UHA1R-0030L的艾默生小型UPS的远程实时数据采集,为地铁无人值守车站小型UPS远程监测提供了解决方案,对解决长期以来地铁无人值守车站小型UPS发生故障无法及时处理的问题具有十分重要的意义。展开更多
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA...An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance.展开更多
This paper presents an improved simple power attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power meas...This paper presents an improved simple power attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power measurements, in this paper, two types of the simple power attack are presented and shown to be tolerant of errors that might occur in the Hamming weight determinations. In practical applications of the attack, such errors are likely to occur due to noise and distortion in the power measurements and their mapping to the Hamming weights of the data. To resist these attacks, the required design rationale of key schedules and several practical countermeasures are suggested.展开更多
日前,美国国家半导体(简称NS)公司宣布推出系列SIMPLE SWITCHER同步降压控制器及增强版WEBENCH Power Designer设计工具。全新产品隶属于美国国家半导体PowerWise高能源效率产品系列,延续了PowerWise品牌的低功耗与高性能特性,同...日前,美国国家半导体(简称NS)公司宣布推出系列SIMPLE SWITCHER同步降压控制器及增强版WEBENCH Power Designer设计工具。全新产品隶属于美国国家半导体PowerWise高能源效率产品系列,延续了PowerWise品牌的低功耗与高性能特性,同步推出的开发工具帮助工程师简化设计流程,加快产品的上市时间。展开更多
The article considers the issues on preliminary calculation of human-powered ornithopter general performances. The model of “simple ornithopter” is introduced. Giving an example of simple ornithopter interaction wit...The article considers the issues on preliminary calculation of human-powered ornithopter general performances. The model of “simple ornithopter” is introduced. Giving an example of simple ornithopter interaction with the environment, the formula of relation of ornithopter theoretically available propulsion to kinematic and physical parameters of its horizontal flight parameters is derived. The tasking is performed for the following stages of calculation and design of the human-powered ornithopter.展开更多
椭圆曲线公钥密码是公钥密码体制的主流方向之一.由于密钥短、计算速度快,该体制在智能卡和手机存储卡等受限的环境中得到了广泛的应用.椭圆曲线密码体系中最耗时的运算是标量乘.标量乘需要安全、有效、快速的实现算法.Montgomery算法...椭圆曲线公钥密码是公钥密码体制的主流方向之一.由于密钥短、计算速度快,该体制在智能卡和手机存储卡等受限的环境中得到了广泛的应用.椭圆曲线密码体系中最耗时的运算是标量乘.标量乘需要安全、有效、快速的实现算法.Montgomery算法是计算椭圆曲线标量乘的算法之一,它能够有效地抵抗简单能量分析.在Montgomery算法结构的基础上,文中首次利用统一Z坐标技巧和循环中间阶段不计算Y坐标的技巧,改进了有限域GF(3~m)上椭圆曲线的点加和倍点公式,构造了抵抗简单能量攻击的co-Z Montgomery算法.设I,M,C分别表示有限域上的求逆、乘法、立方.当域上的平方和乘法使用相同的算法时,理论分析表明每轮循环中,co-Z Montgomery算法比仿射Montgomery算法快I+C-5 M,比射影Montgomery算法快C+2 M,比使用"Selected Areas in Cryptography"2012上快速点加、倍点公式的Montgomery算法快2C+M.在文章"特征3有限域上椭圆曲线的Montgomery算法"的模拟实验环境下,结果表明该算法比上述算法分别快26.3%、19.0%、20.6%;Sage云平台的实验结果表明该算法比上述算法分别快24.1%、20.1%、23.1%.展开更多
文摘This work deals with the power exponent 1rand 2r respectively of the maximal and second-maximal prime factors of the order of simple K4-group, and the classification for simple 4{5,7}K--group G (i.e. G can not be divided by 5 nor by 7 or ()Gp= 4 ), simple 5 -4K-group G (i.e. G can not divided by 5 and ()Gp=4) and simple 7-4K-group G (i.e. G can not divided by 7 and ()Gp= 4). It is derived that 1r =1, 2 and 4, and 2r is not greater than 4. All the simple 4K-groups with order 235,237abcdabcdpp and 2357abcd are obtained.
文摘针对地铁无人值守车站信号设备房小型不间断电源(Uninterruptible Power Supply,UPS)因缺乏在线监测而导致故障影响大的问题,开展了基于5G和简单网络管理协议(Simple Network Management Protocol,SNMP)的小型UPS在线监测方法研究,对监测系统的原理及组成进行了详细的阐述,分析了SNMP协议的管理信息库(Management Information Base,MIB),并给出了MIB库的应用方法,运用5G技术进行数据传输,最后通过编制应用软件,实现了型号为UHA1R-0030L的艾默生小型UPS的远程实时数据采集,为地铁无人值守车站小型UPS远程监测提供了解决方案,对解决长期以来地铁无人值守车站小型UPS发生故障无法及时处理的问题具有十分重要的意义。
基金supported by the National Natural Science Foundation of China(60373109)Ministry of Science and Technologyof China and the National Commercial Cryptography Application Technology Architecture and Application DemonstrationProject(2008BAA22B02).
文摘An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance.
基金the National Natural Science Foundation of China (60673072)the Natural Basic Research Program of China (2007CB311201)
文摘This paper presents an improved simple power attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power measurements, in this paper, two types of the simple power attack are presented and shown to be tolerant of errors that might occur in the Hamming weight determinations. In practical applications of the attack, such errors are likely to occur due to noise and distortion in the power measurements and their mapping to the Hamming weights of the data. To resist these attacks, the required design rationale of key schedules and several practical countermeasures are suggested.
文摘日前,美国国家半导体(简称NS)公司宣布推出系列SIMPLE SWITCHER同步降压控制器及增强版WEBENCH Power Designer设计工具。全新产品隶属于美国国家半导体PowerWise高能源效率产品系列,延续了PowerWise品牌的低功耗与高性能特性,同步推出的开发工具帮助工程师简化设计流程,加快产品的上市时间。
文摘The article considers the issues on preliminary calculation of human-powered ornithopter general performances. The model of “simple ornithopter” is introduced. Giving an example of simple ornithopter interaction with the environment, the formula of relation of ornithopter theoretically available propulsion to kinematic and physical parameters of its horizontal flight parameters is derived. The tasking is performed for the following stages of calculation and design of the human-powered ornithopter.
文摘椭圆曲线公钥密码是公钥密码体制的主流方向之一.由于密钥短、计算速度快,该体制在智能卡和手机存储卡等受限的环境中得到了广泛的应用.椭圆曲线密码体系中最耗时的运算是标量乘.标量乘需要安全、有效、快速的实现算法.Montgomery算法是计算椭圆曲线标量乘的算法之一,它能够有效地抵抗简单能量分析.在Montgomery算法结构的基础上,文中首次利用统一Z坐标技巧和循环中间阶段不计算Y坐标的技巧,改进了有限域GF(3~m)上椭圆曲线的点加和倍点公式,构造了抵抗简单能量攻击的co-Z Montgomery算法.设I,M,C分别表示有限域上的求逆、乘法、立方.当域上的平方和乘法使用相同的算法时,理论分析表明每轮循环中,co-Z Montgomery算法比仿射Montgomery算法快I+C-5 M,比射影Montgomery算法快C+2 M,比使用"Selected Areas in Cryptography"2012上快速点加、倍点公式的Montgomery算法快2C+M.在文章"特征3有限域上椭圆曲线的Montgomery算法"的模拟实验环境下,结果表明该算法比上述算法分别快26.3%、19.0%、20.6%;Sage云平台的实验结果表明该算法比上述算法分别快24.1%、20.1%、23.1%.