期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Temperature-Triggered Hardware Trojan Based Algebraic Fault Analysis of SKINNY-64-64 Lightweight Block Cipher
1
作者 Lei Zhu Jinyue Gong +1 位作者 Liang Dong Cong Zhang 《Computers, Materials & Continua》 SCIE EI 2023年第6期5521-5537,共17页
SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a v... SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64. 展开更多
关键词 SKINNY-64-64 lightweight block cipher algebraic fault analysis Hardware Trojan residual entropy
下载PDF
Toward a Neurophysiological Measure of Image Quality Perception Based on Algebraic Topology Analysis
2
作者 Chang Liu Xiaoyu Ma +2 位作者 Yijie Zhou Jiaojiao Wang Dingguo Yu 《China Communications》 SCIE CSCD 2022年第2期31-38,共8页
The bandwidth of internet connections is still a bottleneck when transmitting large amounts of images,making the image quality assessment essential.Neurophysiological assessment of image quality has highlight advantag... The bandwidth of internet connections is still a bottleneck when transmitting large amounts of images,making the image quality assessment essential.Neurophysiological assessment of image quality has highlight advantages for it does not interfere with natural viewing behavior.However,in JPEG compression,the previous study is hard to tell the difference between the electroencephalogram(EEG)evoked by different quality images.In this paper,we propose an EEG analysis approach based on algebraic topology analysis,and the result shows that the difference between Euler characteristics of EEG evoked by different distortion images is striking both in the alpha and beta band.Moreover,we further discuss the relationship between the images and the EEG signals,and the results implied that the algebraic topological properties of images are consistent with that of brain perception,which is possible to give birth to braininspired image compression based on algebraic topological features.In general,an algebraic topologybased approach was proposed in this paper to analyze the perceptual characteristics of image quality,which will be beneficial to provide a reliable score for data compression in the network and improve the network transmission capacity. 展开更多
关键词 image quality assessment ELECTROENCEPHALOGRAM algebraic topology analysis Euler characteristic
下载PDF
A Comprehensive Study of Algebraic Fault Analysis on PRINCE
3
作者 ZHANG Fan ZHAO Xinjie +3 位作者 GUO Shize SHEN Jizhong HUANG Jing HU Zijie 《China Communications》 SCIE CSCD 2015年第7期127-141,共15页
PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES... PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES and current results are different. This paper aims to make a comprehensive study of algebraic fault analysis(AFA) on PRINCE. How to build the equations for PRINCE and faults are explained. Extensive experiments are conducted. Under nibble-based fault model, AFA with three or four fault injections can succeed within 300 seconds with a very high probability. Under other fault models such as byte-based, half word-based, word-based fault models, the faults become overlapped in the last round and previous DFAs are difficult to work. Our results show that AFA can still succeed to recover the full master key. To evaluate security of PRINCE against fault attacks, we utilize AFA to calculate the reduced entropy of the secret key for given amount of fault injections. The results can interpret and compare the efficiency of previous work. Under nibble-based fault model, the master key of PRINCE can be reduced to 29.69 and 236.10 with 3 and 2 fault injections on average, respectively. 展开更多
关键词 algebraic fault analysis PRINCE Crypto Mini SAT
下载PDF
Airy, Beltrami, Maxwell, Einstein and Lanczos Potentials Revisited 被引量:1
4
作者 J.-F. Pommaret 《Journal of Modern Physics》 2016年第7期699-728,共30页
The purpose of this paper is to revisit the well known potentials, also called stress functions, needed in order to study the parametrizations of the stress equations, respectively provided by G.B. Airy (1863) for 2-d... The purpose of this paper is to revisit the well known potentials, also called stress functions, needed in order to study the parametrizations of the stress equations, respectively provided by G.B. Airy (1863) for 2-dimensional elasticity, then by E. Beltrami (1892), J.C. Maxwell (1870) for 3-dimensional elasticity, finally by A. Einstein (1915) for 4-dimensional elasticity, both with a variational procedure introduced by C. Lanczos (1949, 1962) in order to relate potentials to Lagrange multipliers. Using the methods of Algebraic Analysis, namely mixing differential geometry with homological algebra and combining the double duality test involved with the Spencer cohomology, we shall be able to extend these results to an arbitrary situation with an arbitrary dimension n. We shall also explain why double duality is perfectly adapted to variational calculus with differential constraints as a way to eliminate the corresponding Lagrange multipliers. For example, the canonical parametrization of the stress equations is just described by the formal adjoint of the  components of the linearized Riemann tensor considered as a linear second order differential operator but the minimum number of potentials needed is equal to for any minimal parametrization, the Einstein parametrization being “in between” with potentials. We provide all the above results without even using indices for writing down explicit formulas in the way it is done in any textbook today, but it could be strictly impossible to obtain them without using the above methods. We also revisit the possibility (Maxwell equations of electromagnetism) or the impossibility (Einstein equations of gravitation) to obtain canonical or minimal parametrizations for various equations of physics. It is nevertheless important to notice that, when n and the algorithms presented are known, most of the calculations can be achieved by using computers for the corresponding symbolic computations. Finally, though the paper is mathematically oriented as it aims providing new insights towards the mathematical foundations of general relativity, it is written in a rather self-contained way. 展开更多
关键词 Stress Equations Stress Functions Elasticity Theory Lagrange Multipliers Formal Adjoint Control Theory General Relativity Einstein Equations Lanczos Potentials algebraic analysis Riemann Tensor Weyl Tensor
下载PDF
Computer simulations for intense continuous beam transport in electrostatic lens systems
5
作者 赵小松 吕建钦 《Chinese Physics C》 SCIE CAS CSCD 北大核心 2008年第9期750-753,共4页
A code LEADS based on the Lie algebraic analysis for the continuous beam dynamics with space charge effect in beam transport has been developed. The program is used for the simulations of axial-symmetric and unsymmetr... A code LEADS based on the Lie algebraic analysis for the continuous beam dynamics with space charge effect in beam transport has been developed. The program is used for the simulations of axial-symmetric and unsymmetrical intense continuous beam in the channels including drift spaces, electrostatic lenses and DC electrostatic accelerating tubes. In order to get the accuracy required, all elements are divided into many small segments, and the electric field in the segments is regarded as uniform field, and the dividing points are treated as thin lenses. Iteration procedures are adopted in the program to obtain self-consistent solutions. The code can be used in the designs of low energy beam transport systems, electrostatic accelerators and ion implantation machines. 展开更多
关键词 intense continuous beam axial-symmetric electrostatic field Lie algebraic analysis space charge effect
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部