A stochastic finite element computational methodology for probabilistic durability assessment of deteriorating reinforced concrete(RC) bridges by considering the time-and space-dependent variabilities is presented.F...A stochastic finite element computational methodology for probabilistic durability assessment of deteriorating reinforced concrete(RC) bridges by considering the time-and space-dependent variabilities is presented.First,finite element analysis with a smeared cracking approach is implemented.The time-dependent bond-slip relationship between steel and concrete,and the stress-strain relationship of corroded steel bars are considered.Secondly,a stochastic finite element-based computational framework for reliability assessment of deteriorating RC bridges is proposed.The spatial and temporal variability of several parameters affecting the reliability of RC bridges is considered.Based on the data reported by several researchers and from field investigations,the Monte Carlo simulation is used to account for the uncertainties in various parameters,including local and general corrosion in rebars,concrete cover depth,surface chloride concentration,chloride diffusion coefficient,and corrosion rate.Finally,the proposed probabilistic durability assessment approach and framework are applied to evaluate the time-dependent reliability of a girder of a RC bridge located on the Tianjin Binhai New Area in China.展开更多
The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authen...The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authentication Code(MAC).Our scheme was implemented in hardware,which utilizes hardware oriented secure conversion techniques between boolean and arithmetic masking.Security evaluation based on SAKURA-G FPGA board has been done with 2000 power traces from 2000 random plaintexts with random plaintext masks and random key masks.It has been verified that the masked SM3 hardware implementation shows no intermediate value leakage as expected.Our masked SM3 hardware can resist first-order correlation power attack(CPA) and collision correlation attack.展开更多
基金The National Natural Science Foundation of China (No.50708065)the National High Technology Research and Development Program of China (863 Program) (No. 2007AA11Z113)Specialized Research Fund for the Doctoral Program of Higher Education (No. 20070056125)
文摘A stochastic finite element computational methodology for probabilistic durability assessment of deteriorating reinforced concrete(RC) bridges by considering the time-and space-dependent variabilities is presented.First,finite element analysis with a smeared cracking approach is implemented.The time-dependent bond-slip relationship between steel and concrete,and the stress-strain relationship of corroded steel bars are considered.Secondly,a stochastic finite element-based computational framework for reliability assessment of deteriorating RC bridges is proposed.The spatial and temporal variability of several parameters affecting the reliability of RC bridges is considered.Based on the data reported by several researchers and from field investigations,the Monte Carlo simulation is used to account for the uncertainties in various parameters,including local and general corrosion in rebars,concrete cover depth,surface chloride concentration,chloride diffusion coefficient,and corrosion rate.Finally,the proposed probabilistic durability assessment approach and framework are applied to evaluate the time-dependent reliability of a girder of a RC bridge located on the Tianjin Binhai New Area in China.
基金supported by the National Major Program "Core of Electronic Devices,High-End General Chips,and Basis of Software Products" of the Ministry of Industry and Information Technology of China (Nos.2014ZX01032205,2014ZX01032401001-Z05)the National Natural Science Foundation of China(No.61402252) "12th Five-Year Plan" The National Development Foundation for Cryptological Research(No. MMJJ201401009)
文摘The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authentication Code(MAC).Our scheme was implemented in hardware,which utilizes hardware oriented secure conversion techniques between boolean and arithmetic masking.Security evaluation based on SAKURA-G FPGA board has been done with 2000 power traces from 2000 random plaintexts with random plaintext masks and random key masks.It has been verified that the masked SM3 hardware implementation shows no intermediate value leakage as expected.Our masked SM3 hardware can resist first-order correlation power attack(CPA) and collision correlation attack.