Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key de...Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key degeneration and slow evolution within populations.These challenges significantly hinder key recovery efforts.This paper proposes a screening correlation power analysis framework combined with a genetic algorithm,named SFGA-CPA,to address these issues.SFGA-CPA introduces three operations designed to exploit CPA characteris-tics:propagative operation,constrained crossover,and constrained mutation.Firstly,the propagative operation accelerates population evolution by maximizing the number of correct bytes in each individual.Secondly,the constrained crossover and mutation operations effectively address key degeneration by preventing the compromise of correct bytes.Finally,an intelligent search method is proposed to identify optimal parameters,further improving attack efficiency.Experiments were conducted on both simulated environments and real power traces collected from the SAKURA-G platform.In the case of simulation,SFGA-CPA reduces the number of traces by 27.3%and 60%compared to CPA based on multiple screening methods(MS-CPA)and CPA based on simple GA method(SGA-CPA)when the success rate reaches 90%.Moreover,real experimental results on the SAKURA-G platform demonstrate that our approach outperforms other methods.展开更多
The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher...The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent.展开更多
A 3D finite element model was established to investigate the temperature and stress fields during the selective laser melting process of Al−Mg−Sc−Zr alloy.By considering the powder−solid transformation,temperaturedepe...A 3D finite element model was established to investigate the temperature and stress fields during the selective laser melting process of Al−Mg−Sc−Zr alloy.By considering the powder−solid transformation,temperaturedependent thermal properties,latent heat of phase transformations and molten pool convection,the effects of laser power,point distance and hatch spacing on the temperature distribution,molten pool dimensions and residual stress distribution were investigated.Then,the effects of laser power,point distance and hatch spacing on the microstructure,density and hardness of the alloy were studied by the experimental method.The results show that the molten pool size gradually increases as the laser power increases and the point distance and hatch spacing decrease.The residual stress mainly concentrates in the middle of the first scanning track and the beginning and end of each scanning track.Experimental results demonstrate the accuracy of the model.The density of the samples tends to increase and then decrease with increasing laser power and decreasing point distance and hatch spacing.The optimum process parameters are laser power of 325−375 W,point distance of 80−100μm and hatch spacing of 80μm.展开更多
Thermal analyses on squeeze cast aluminum alloy A380(SC A380) solidified under 90MPa were carried out to study the microstructure development of the alloy, in which a differential scanning calorimeter(DSC) was employe...Thermal analyses on squeeze cast aluminum alloy A380(SC A380) solidified under 90MPa were carried out to study the microstructure development of the alloy, in which a differential scanning calorimeter(DSC) was employed. During the DSC runs, heating and cooling rates of 1, 3, 10, and 20 °C·min^(-1) were applied to investigate the heating and cooling effects on dissolution of secondary eutectic phases and microstructure evolution. Various reactions corresponding to troughs and peaks of the DSC curves were identified as corresponding to phase transformations taking place during dissolution or precipitation suggested by the principles of thermodynamics and kinetics. The comparison of the identified characteristic temperatures in the measured heating and cooling curves are generally in good agreement with the computed equilibrium temperatures. The microstructure analyses by scanning electron microscopy(SEM) with energy dispersive X-ray spectroscopy(EDS) indicate that the distribution and morphology of secondary phases present in the microstructure of the annealed sample are similar to the as-cast A380, i.e., strip β(Si), buck bone like or dot distributed θ(Al_2Cu), β(Al_5Fe Si) and Al_(15)(FeMn)_3Si_2. Two kinetic methods are employed to calculate the activation energies of the three common troughs and three common peaks in DSC curves of SC A380. The activation energies of the identified reaction θ_(CuAl_2) = α(Al)+β(Si) is 188.7 and 187.1 k J?mol^(-1) when the activation energies of reaction α(Al)+β(Si)→θCu Al_2 is^(-1)22.7 and^(-1)21.8 k J?mol^(-1), by the Kissinger and Starink methods, respectively.展开更多
Learning a language must begin with learning pronunciation,vocabulary and grammar.Among these three factors,vo cabulary is of great importance.By putting the method of the Contrastive Analysis theories into practice,t...Learning a language must begin with learning pronunciation,vocabulary and grammar.Among these three factors,vo cabulary is of great importance.By putting the method of the Contrastive Analysis theories into practice,this thesis presents the necessity and significance of Contrastive Analysis in practical teaching.展开更多
Simple power analysis is the most devastating attack on the security of elliptic curve scalar multiplication and can probably retrieve the secret key. In this paper,we analyze the formulas of point doubling and additi...Simple power analysis is the most devastating attack on the security of elliptic curve scalar multiplication and can probably retrieve the secret key. In this paper,we analyze the formulas of point doubling and addition on Jacobi-quartic Curve in projective coordination. In addition,a fast and secure side-channel atomic scalar multiplication algorithm is proposed using the side-channel atomic block. Compared with the previous methods,the new algorithm is more efficient. For 192 bits scalar using NAF recoding,the efficiency of the new algorithm is increased by about 6.7%~23% if S/M=0.8 or 12.7%~33.2% if S/M=0.6.展开更多
As the process of economic globalization deepens,a large variety of integrated circuit designers tends to move the chip's manufacturing to the developing country.But during the globalization of semiconductor desig...As the process of economic globalization deepens,a large variety of integrated circuit designers tends to move the chip's manufacturing to the developing country.But during the globalization of semiconductor design and fabrication process,integrated circuits are suffering from increasing malicious alterations from the untrusted foundries,which pose a serious threat to the military,finance,transportation and other critical systems.An noninvasive approach was presented to measure the physical "sidechannel"parameter of a chip such as current or delay,which is effectively capable of detecting the malicious hardware alternations.The intrinsic relationship of a circuit's side-channel parameters was exploited to distinguish the effect of a Trojan in the presence of large random noise and process noise,such as the Dynamic current(IDDT)versus the maximum operating frequency(Fmax)correlation.The Monte Carlo analysis in Hspice using ± 20% Gauss variations in transistor threshold voltage(Vth)was carried out to simulate the circuit state in the real world.Simulation Results show that this approach is effective to detect the ultra-small Trojans.展开更多
To study the variations in surface hydrography and circulation in northern South China Sea (NSCS), rotated empirical orthogonal function (REOF) and extended associate pattern analysis (EAPA) are used with daily sea su...To study the variations in surface hydrography and circulation in northern South China Sea (NSCS), rotated empirical orthogonal function (REOF) and extended associate pattern analysis (EAPA) are used with daily sea surface salinity (SSS), sea surface temperature (SST) and sea surface height (SSH) datasets cover- ing 1 126 days from American Navy Experimental Real-Time East Asian Seas Ocean Nowcast System in this paper. Results show that in summer, the SCS Diluted Water Expansion (SDWE) is the most dominant factor con- trolling SSS variations in the NSCS. The remarkable SDWE usually begins in early July, reaches its maximum in middle August and weakens in late September. In summer flourishing period, its low saline core is just limited between 21°N and 22°N because of strong surface anomalous anticyclonic circulation in the NSCS. In early or late stage, the anomalous anticyclonic circulation becomes weak or turns into cyclonic one, thus the weak SCS diluted water can disperse. And its influence on the SSS variations has obviously decreased. The Kuroshio intrusion is the second controlling factor, and it has the almost opposite seasonal or intraseasonal oscillations and spatial charac- teristics to the SDWE. Winter Kuroshio Intrusion (WKI) begins in early November and lasts about three months. Intraseasonal Kuroshio Intrusion (IKI) takes place at any seasons. The westward Ekman transport produced by the north anomaly of East Asia Monsoon (EAM) pushes warmer and more saline seawater into the NSCS through the Bashi Strait and seems to decide the intensity of seasonal and intraseasonal Kuroshio intrusions.展开更多
Heterogeneity of biological samples is usually considered a major obstacle for three-dimensional (3D) structure determination of macromolecular complexes. Heterogeneity may occur at the level of composition or conform...Heterogeneity of biological samples is usually considered a major obstacle for three-dimensional (3D) structure determination of macromolecular complexes. Heterogeneity may occur at the level of composition or conformational variability of complexes and affects most 3D structure determination methods that rely on signal averaging. Here, an approach is described that allows sorting structural states based on a 3D statistical approach, the 3D sampling and classification (3D-SC) of 3D structures derived from single particles imaged by cryo electron microscopy (cryo-EM). The method is based on jackknifing & bootstrapping of 3D sub-ensembles and 3D multivariate statistical analysis followed by 3D classification. The robustness of the statistical sorting procedure is corroborated using model data from an RNA polymerase structure and experimental data from a ribosome complex. It allows resolving multiple states within heterogeneous complexes that thus become amendable for a structural analysis despite of their highly flexible nature. The method has important implications for high-resolution structural studies and allows describing structure ensembles to provide insights into the dynamics of multi-component macromolecular assemblies.展开更多
基金supported by the Hunan Provincial Natrual Science Foundation of China(2022JJ30103)“the 14th Five-Year”Key Disciplines and Application Oriented Special Disciplines of Hunan Province(Xiangjiaotong[2022],351)the Science and Technology Innovation Program of Hunan Province(2016TP1020).
文摘Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key degeneration and slow evolution within populations.These challenges significantly hinder key recovery efforts.This paper proposes a screening correlation power analysis framework combined with a genetic algorithm,named SFGA-CPA,to address these issues.SFGA-CPA introduces three operations designed to exploit CPA characteris-tics:propagative operation,constrained crossover,and constrained mutation.Firstly,the propagative operation accelerates population evolution by maximizing the number of correct bytes in each individual.Secondly,the constrained crossover and mutation operations effectively address key degeneration by preventing the compromise of correct bytes.Finally,an intelligent search method is proposed to identify optimal parameters,further improving attack efficiency.Experiments were conducted on both simulated environments and real power traces collected from the SAKURA-G platform.In the case of simulation,SFGA-CPA reduces the number of traces by 27.3%and 60%compared to CPA based on multiple screening methods(MS-CPA)and CPA based on simple GA method(SGA-CPA)when the success rate reaches 90%.Moreover,real experimental results on the SAKURA-G platform demonstrate that our approach outperforms other methods.
基金the Hunan Provincial Natrual Science Foundation of China(2022JJ30103)“the 14th Five-Year”Key Disciplines and Application Oriented Special Disciplines of Hunan Province(Xiangjiaotong[2022]351)the Science and Technology Innovation Program of Hunan Province(2016TP1020).
文摘The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent.
基金financial supports from the National Natural Science Foundation of China (No.51804349)the China Postdoctoral Science Foundation (No.2018M632986)+1 种基金the Natural Science Foundation of Hunan Province,China (No.2019JJ50766)the National Key Laboratory of Science and Technology on High-strength Structural Materials,China (No.JCKY201851)。
文摘A 3D finite element model was established to investigate the temperature and stress fields during the selective laser melting process of Al−Mg−Sc−Zr alloy.By considering the powder−solid transformation,temperaturedependent thermal properties,latent heat of phase transformations and molten pool convection,the effects of laser power,point distance and hatch spacing on the temperature distribution,molten pool dimensions and residual stress distribution were investigated.Then,the effects of laser power,point distance and hatch spacing on the microstructure,density and hardness of the alloy were studied by the experimental method.The results show that the molten pool size gradually increases as the laser power increases and the point distance and hatch spacing decrease.The residual stress mainly concentrates in the middle of the first scanning track and the beginning and end of each scanning track.Experimental results demonstrate the accuracy of the model.The density of the samples tends to increase and then decrease with increasing laser power and decreasing point distance and hatch spacing.The optimum process parameters are laser power of 325−375 W,point distance of 80−100μm and hatch spacing of 80μm.
基金supported by the Natural Sciences and Engineering Research Council of Canada(NSERC)Discovery(No239080-2010)the project of Shandong science and technology development plan(No2014GGX103035),China
文摘Thermal analyses on squeeze cast aluminum alloy A380(SC A380) solidified under 90MPa were carried out to study the microstructure development of the alloy, in which a differential scanning calorimeter(DSC) was employed. During the DSC runs, heating and cooling rates of 1, 3, 10, and 20 °C·min^(-1) were applied to investigate the heating and cooling effects on dissolution of secondary eutectic phases and microstructure evolution. Various reactions corresponding to troughs and peaks of the DSC curves were identified as corresponding to phase transformations taking place during dissolution or precipitation suggested by the principles of thermodynamics and kinetics. The comparison of the identified characteristic temperatures in the measured heating and cooling curves are generally in good agreement with the computed equilibrium temperatures. The microstructure analyses by scanning electron microscopy(SEM) with energy dispersive X-ray spectroscopy(EDS) indicate that the distribution and morphology of secondary phases present in the microstructure of the annealed sample are similar to the as-cast A380, i.e., strip β(Si), buck bone like or dot distributed θ(Al_2Cu), β(Al_5Fe Si) and Al_(15)(FeMn)_3Si_2. Two kinetic methods are employed to calculate the activation energies of the three common troughs and three common peaks in DSC curves of SC A380. The activation energies of the identified reaction θ_(CuAl_2) = α(Al)+β(Si) is 188.7 and 187.1 k J?mol^(-1) when the activation energies of reaction α(Al)+β(Si)→θCu Al_2 is^(-1)22.7 and^(-1)21.8 k J?mol^(-1), by the Kissinger and Starink methods, respectively.
文摘Learning a language must begin with learning pronunciation,vocabulary and grammar.Among these three factors,vo cabulary is of great importance.By putting the method of the Contrastive Analysis theories into practice,this thesis presents the necessity and significance of Contrastive Analysis in practical teaching.
基金sponsored and financial supported by National Natural Science Foundation of China (NSFC), grant No.61003121Sichuan Province High Technology Program under No.2009CD00014
文摘Simple power analysis is the most devastating attack on the security of elliptic curve scalar multiplication and can probably retrieve the secret key. In this paper,we analyze the formulas of point doubling and addition on Jacobi-quartic Curve in projective coordination. In addition,a fast and secure side-channel atomic scalar multiplication algorithm is proposed using the side-channel atomic block. Compared with the previous methods,the new algorithm is more efficient. For 192 bits scalar using NAF recoding,the efficiency of the new algorithm is increased by about 6.7%~23% if S/M=0.8 or 12.7%~33.2% if S/M=0.6.
文摘As the process of economic globalization deepens,a large variety of integrated circuit designers tends to move the chip's manufacturing to the developing country.But during the globalization of semiconductor design and fabrication process,integrated circuits are suffering from increasing malicious alterations from the untrusted foundries,which pose a serious threat to the military,finance,transportation and other critical systems.An noninvasive approach was presented to measure the physical "sidechannel"parameter of a chip such as current or delay,which is effectively capable of detecting the malicious hardware alternations.The intrinsic relationship of a circuit's side-channel parameters was exploited to distinguish the effect of a Trojan in the presence of large random noise and process noise,such as the Dynamic current(IDDT)versus the maximum operating frequency(Fmax)correlation.The Monte Carlo analysis in Hspice using ± 20% Gauss variations in transistor threshold voltage(Vth)was carried out to simulate the circuit state in the real world.Simulation Results show that this approach is effective to detect the ultra-small Trojans.
基金This work is supported by the Innovation Project of Chinese Academyof Sciences (KZCX3-SW-222)
文摘To study the variations in surface hydrography and circulation in northern South China Sea (NSCS), rotated empirical orthogonal function (REOF) and extended associate pattern analysis (EAPA) are used with daily sea surface salinity (SSS), sea surface temperature (SST) and sea surface height (SSH) datasets cover- ing 1 126 days from American Navy Experimental Real-Time East Asian Seas Ocean Nowcast System in this paper. Results show that in summer, the SCS Diluted Water Expansion (SDWE) is the most dominant factor con- trolling SSS variations in the NSCS. The remarkable SDWE usually begins in early July, reaches its maximum in middle August and weakens in late September. In summer flourishing period, its low saline core is just limited between 21°N and 22°N because of strong surface anomalous anticyclonic circulation in the NSCS. In early or late stage, the anomalous anticyclonic circulation becomes weak or turns into cyclonic one, thus the weak SCS diluted water can disperse. And its influence on the SSS variations has obviously decreased. The Kuroshio intrusion is the second controlling factor, and it has the almost opposite seasonal or intraseasonal oscillations and spatial charac- teristics to the SDWE. Winter Kuroshio Intrusion (WKI) begins in early November and lasts about three months. Intraseasonal Kuroshio Intrusion (IKI) takes place at any seasons. The westward Ekman transport produced by the north anomaly of East Asia Monsoon (EAM) pushes warmer and more saline seawater into the NSCS through the Bashi Strait and seems to decide the intensity of seasonal and intraseasonal Kuroshio intrusions.
文摘Heterogeneity of biological samples is usually considered a major obstacle for three-dimensional (3D) structure determination of macromolecular complexes. Heterogeneity may occur at the level of composition or conformational variability of complexes and affects most 3D structure determination methods that rely on signal averaging. Here, an approach is described that allows sorting structural states based on a 3D statistical approach, the 3D sampling and classification (3D-SC) of 3D structures derived from single particles imaged by cryo electron microscopy (cryo-EM). The method is based on jackknifing & bootstrapping of 3D sub-ensembles and 3D multivariate statistical analysis followed by 3D classification. The robustness of the statistical sorting procedure is corroborated using model data from an RNA polymerase structure and experimental data from a ribosome complex. It allows resolving multiple states within heterogeneous complexes that thus become amendable for a structural analysis despite of their highly flexible nature. The method has important implications for high-resolution structural studies and allows describing structure ensembles to provide insights into the dynamics of multi-component macromolecular assemblies.