期刊文献+
共找到158篇文章
< 1 2 8 >
每页显示 20 50 100
Side-Channel Leakage Analysis of Inner Product Masking
1
作者 Yuyuan Li Lang Li Yu Ou 《Computers, Materials & Continua》 SCIE EI 2024年第4期1245-1262,共18页
The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher... The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent. 展开更多
关键词 side-channel analysis inner product masking mutual information nonlinear leakage
下载PDF
SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm
2
作者 Jiahui Liu Lang Li +1 位作者 Di Li Yu Ou 《Computers, Materials & Continua》 SCIE EI 2024年第6期4641-4657,共17页
Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key de... Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key degeneration and slow evolution within populations.These challenges significantly hinder key recovery efforts.This paper proposes a screening correlation power analysis framework combined with a genetic algorithm,named SFGA-CPA,to address these issues.SFGA-CPA introduces three operations designed to exploit CPA characteris-tics:propagative operation,constrained crossover,and constrained mutation.Firstly,the propagative operation accelerates population evolution by maximizing the number of correct bytes in each individual.Secondly,the constrained crossover and mutation operations effectively address key degeneration by preventing the compromise of correct bytes.Finally,an intelligent search method is proposed to identify optimal parameters,further improving attack efficiency.Experiments were conducted on both simulated environments and real power traces collected from the SAKURA-G platform.In the case of simulation,SFGA-CPA reduces the number of traces by 27.3%and 60%compared to CPA based on multiple screening methods(MS-CPA)and CPA based on simple GA method(SGA-CPA)when the success rate reaches 90%.Moreover,real experimental results on the SAKURA-G platform demonstrate that our approach outperforms other methods. 展开更多
关键词 side-channel analysis correlation power analysis genetic algorithm CROSSOVER MUTATION
下载PDF
基于MS Analysis Services多维分析系统的实现 被引量:2
3
作者 张涛 宋继良 徐星辉 《哈尔滨理工大学学报》 CAS 2003年第3期16-18,21,共4页
基于OLAP技术相关理论,通过分析MS Analysis Services中的多维数据集的建立和访问技术,提出了一种多维分析系统设计与实现方法,并在此基础上给出了一个从OLAP数据源结构设计到应用程序设计的实例,实现了对数据的多角度、多层次的查询及... 基于OLAP技术相关理论,通过分析MS Analysis Services中的多维数据集的建立和访问技术,提出了一种多维分析系统设计与实现方法,并在此基础上给出了一个从OLAP数据源结构设计到应用程序设计的实例,实现了对数据的多角度、多层次的查询及初步分析功能。 展开更多
关键词 “MS analysis Services” 多维查询分析系统 OLAP 数据仓库 联机分析处理 多维表达式 “ADO MD组件” “Visual Basic 财务管理 数据立方体 决策支持系统
下载PDF
基于MS Analysis Services的OLAP分析系统的设计与实现 被引量:5
4
作者 邱怀姗 朱群雄 《北京化工大学学报(自然科学版)》 CAS CSCD 2004年第1期103-107,共5页
文中对MSAnalysisServices中的多维数据建立和访问技术进行了讨论 ,提出了一种OLAP分析系统的设计与实现方法 ,在此基础上给出了一个从OLAP数据源设计到应用程序设计的实例。
关键词 多维分析 数据立方体 多维表达式 数据转换服务
下载PDF
用SQL Server2000 Analysis Service设计与创建多维数据集 被引量:3
5
作者 张友平 杨丽萍 《上海海运学院学报》 北大核心 2003年第1期72-74,共3页
阐述了SQLServer 2 0 0 0分析服务的功能与体系结构 ,介绍了利用分析服务构建多维数据集的全过程 :建立数据维度、存储多维数据集、处理数据爆炸和分析多维数据集。
关键词 分析服务 维度 多维数据集 聚合体
下载PDF
Multiple Parameters Side Channel Signal Analysis Using in Hardware Trojan Detection
6
作者 刘燕江 王力纬 +2 位作者 谢云 冯秋丽 侯波 《Journal of Donghua University(English Edition)》 EI CAS 2015年第6期1055-1059,共5页
As the process of economic globalization deepens,a large variety of integrated circuit designers tends to move the chip's manufacturing to the developing country.But during the globalization of semiconductor desig... As the process of economic globalization deepens,a large variety of integrated circuit designers tends to move the chip's manufacturing to the developing country.But during the globalization of semiconductor design and fabrication process,integrated circuits are suffering from increasing malicious alterations from the untrusted foundries,which pose a serious threat to the military,finance,transportation and other critical systems.An noninvasive approach was presented to measure the physical "sidechannel"parameter of a chip such as current or delay,which is effectively capable of detecting the malicious hardware alternations.The intrinsic relationship of a circuit's side-channel parameters was exploited to distinguish the effect of a Trojan in the presence of large random noise and process noise,such as the Dynamic current(IDDT)versus the maximum operating frequency(Fmax)correlation.The Monte Carlo analysis in Hspice using ± 20% Gauss variations in transistor threshold voltage(Vth)was carried out to simulate the circuit state in the real world.Simulation Results show that this approach is effective to detect the ultra-small Trojans. 展开更多
关键词 integrated circuit side-channel parameter Monte Carlo analysis
下载PDF
ST-Map:an Interactive Map for Discovering Spatial and Temporal Patterns in Bibliographic Data 被引量:1
7
作者 ZUO Chenyu XU Yifan +1 位作者 DING Lingfang MENG Liqiu 《Journal of Geodesy and Geoinformation Science》 CSCD 2024年第1期3-15,共13页
Getting insight into the spatiotemporal distribution patterns of knowledge innovation is receiving increasing attention from policymakers and economic research organizations.Many studies use bibliometric data to analy... Getting insight into the spatiotemporal distribution patterns of knowledge innovation is receiving increasing attention from policymakers and economic research organizations.Many studies use bibliometric data to analyze the popularity of certain research topics,well-adopted methodologies,influential authors,and the interrelationships among research disciplines.However,the visual exploration of the patterns of research topics with an emphasis on their spatial and temporal distribution remains challenging.This study combined a Space-Time Cube(STC)and a 3D glyph to represent the complex multivariate bibliographic data.We further implemented a visual design by developing an interactive interface.The effectiveness,understandability,and engagement of ST-Map are evaluated by seven experts in geovisualization.The results suggest that it is promising to use three-dimensional visualization to show the overview and on-demand details on a single screen. 展开更多
关键词 space-time cube bibliographic data spatiotemporal analysis user study interactive map
下载PDF
多维数据仓库系统中高性能DCA-Tree Cube的研究 被引量:1
8
作者 胡孔法 董逸生 +2 位作者 徐立臻 庄晓青 杨科华 《应用科学学报》 CAS CSCD 2003年第2期137-140,共4页
提出了利用R*-tree改进的DCA-tree(data cube aggregate-tree)来创建高性能的DCA-tree cube聚集cube,阐述了创建DCA-tree cube、DCA-tree cube增量更新和MOLAP快速查询等关键技术.算法分析表明,所提出的DCA-tree cube在查询和更新效率... 提出了利用R*-tree改进的DCA-tree(data cube aggregate-tree)来创建高性能的DCA-tree cube聚集cube,阐述了创建DCA-tree cube、DCA-tree cube增量更新和MOLAP快速查询等关键技术.算法分析表明,所提出的DCA-tree cube在查询和更新效率方面要比以往DDC等方法创建的cube要高,解决了在插入新维数据时cube增量的更新维护. 展开更多
关键词 多维数据仓库系统 DCA-Tree cube 数据立方体聚集树立方体 多维联机分析处理 范围查询 聚集技术 增量更新
下载PDF
Application of the third generation of coherent cube inrecognizing faults and fractures 被引量:41
9
作者 张军华 王月英 赵勇 《地震学报》 CSCD 北大核心 2004年第5期560-564,共5页
关键词 相干体 多尺度分析 断层 裂缝
下载PDF
数据仓库系统中一种改进的维层次聚集Cube存储结构 被引量:4
10
作者 梁作鹏 胡孔法 +1 位作者 董逸生 陈崚 《计算机研究与发展》 EI CSCD 北大核心 2005年第8期1362-1368,共7页
提出利用Cube中的维层次(dimensionhierarchy)聚集技术来创建高性能的维层次聚集Cube(dimensionhierarchyaggregatecube,DHAC).充分利用DHAC已保存的维层次信息,对Cube中多维数据的查询和更新效率进行了优化,并且支持Cube的上探、下钻... 提出利用Cube中的维层次(dimensionhierarchy)聚集技术来创建高性能的维层次聚集Cube(dimensionhierarchyaggregatecube,DHAC).充分利用DHAC已保存的维层次信息,对Cube中多维数据的查询和更新效率进行了优化,并且支持Cube的上探、下钻等语义操作.在DHAC中进行数据插入和删除等数据更新时,由下向上用更新前后的差值对受到更新结点影响的所有祖先结点进行增量更新.实现了在插入新维或维层次时不需要重新构建聚集Cube就可以实现Cube的模式更新.对维层次聚集Cube与传统Cube进行了算法性能分析和比较,理论分析和实验结果都表明,所提出的DHAC性能最佳. 展开更多
关键词 数据仓库系统 维层次聚集 cube 存储结构 多维联机分析处理
下载PDF
Fault Analysis on AES:A Property-Based Verification Perspective
11
作者 Xiaojie Dai Xingxin Wang +2 位作者 Xue Qu Baolei Mao Wei Hu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第2期576-588,共13页
Fault analysis is a frequently used side-channel attack for cryptanalysis.However,existing fault attack methods usually involve complex fault fusion analysis or computation-intensive statistical analysis of massive fa... Fault analysis is a frequently used side-channel attack for cryptanalysis.However,existing fault attack methods usually involve complex fault fusion analysis or computation-intensive statistical analysis of massive fault traces.In this work,we take a property-based formal verification approach to fault analysis.We derive fine-grained formal models for automatic fault propagation and fusion,which establish a mathematical foundation for precise measurement and formal reasoning of fault effects.We extract the correlations in fault effects in order to create properties for fault verification.We further propose a method for key recovery,by formally checking when the extracted properties can be satisfied with partial keys as the search variables.Experimental results using both unprotected and masked advanced encryption standard(AES)implementations show that our method has a key search complexity of 216,which only requires two correct and faulty ciphertext pairs to determine the secret key,and does not assume knowledge about fault location or pattern. 展开更多
关键词 side-channel attack fault analysis fault propagation model property extraction fault verification
原文传递
高校图书馆参与学习分析服务的实践及启示--以伍伦贡大学Library Cube项目为例 被引量:1
12
作者 汪姝辰 《高校图书馆工作》 2021年第1期35-39,共5页
文章总结了现阶段学习分析技术在图书馆行业的应用情况,介绍了澳大利亚伍伦贡大学Library Cube项目的设计原理、构建过程及应用情况。Library Cube项目为高校图书馆在拓展服务内容、提升服务品质、加强多方协作和人才队伍建设等方面提... 文章总结了现阶段学习分析技术在图书馆行业的应用情况,介绍了澳大利亚伍伦贡大学Library Cube项目的设计原理、构建过程及应用情况。Library Cube项目为高校图书馆在拓展服务内容、提升服务品质、加强多方协作和人才队伍建设等方面提供了有益经验。但因为各方面的基础条件差异,国内高校图书馆深度参与学习分析仍面临着跨部门协作、技术实现、道德风险和思维转变等方面的问题。 展开更多
关键词 学习分析 Library cube 图书馆价值
下载PDF
使用Delphi的Decision Cube进行多维数据分析 被引量:1
13
作者 刘紫玉 杨会志 《现代计算机》 2002年第9期33-35,共3页
从多维数据分析的角度出发,对Delphi的决策支持组件Dcision Cube进行了介绍,并介绍了如何利用Dicision Cube进行多维数据分析以支持决策,最后简要对Decision Cube进行了总结。
关键词 多维数据分析 Dlphi DECISION cube 数据库 决策支持组件 企业信息化
下载PDF
CUBE/TRIPS软件及其在交通影响分析中的应用 被引量:3
14
作者 杨涛 唐国玺 《交通标准化》 2006年第12期115-118,共4页
通过介绍CUBE/TRIPS软件的功能和特点,以及一种利用其进行交通影响分析预测的方法,并通过实例对该方法进行说明,对利用软件进行交通影响分析预测做简短的评价,其结果对使用CUBE/TRIPS软件的交通建模工作者具有一定的参考价值。
关键词 cube/TRIPS 交通影响分析 交通需求预测
下载PDF
近60年重庆市日照时数时空变化特征及影响因素分析
15
作者 姜金戈 李军 黄成 《绿色科技》 2024年第5期214-220,229,共8页
为探究重庆市日照时数的时空变化规律,基于重庆34个气象站点1961-2020年逐日日照时、风速、温度、总云量、相对湿度资料,使用M-K突变检验、小波分析、时空冷热点模式探测等方法对地区日照时数的时空变化及其影响因素进行分析。结果表明... 为探究重庆市日照时数的时空变化规律,基于重庆34个气象站点1961-2020年逐日日照时、风速、温度、总云量、相对湿度资料,使用M-K突变检验、小波分析、时空冷热点模式探测等方法对地区日照时数的时空变化及其影响因素进行分析。结果表明:①重庆日照时数呈现“东北高、东南低”的分布特点。高值集中在巫山、巫溪等地;低值集中在彭水等地。②年均日照时数呈极显著下降趋势,突变年份1979年,振荡主周期为46年。除春季外其他季节均呈现下降趋势。③时空冷热点表明近重庆近60年的日照时数呈现混合聚类、振荡冷点2种模式。④相关系数的季节性差异表明各因素与日照时数的关系并非定值,其中风速、总云量、相对湿度与日照时数相关性四季均显著,降水与温度与日照仅在夏季关系较为紧密。 展开更多
关键词 日照时数 M-K突变检验 小波分析 时空立方体
下载PDF
交通规划软件TransCAD、CUBE/Trips和Visum的比较分析 被引量:4
16
作者 任敏 《交通与计算机》 2008年第4期125-127,139,共4页
选取国内外广泛使用的3个GIS时代的交通规划软件TransCAD、CUBE/Trips和Visum,从可用性、易用性和灵活性3个方面加以比较。从路网表现能力、数据存储、路阻函数、图形功能和模型功能等几个方面加以分析,总结3个软件的优缺点。TransCAD... 选取国内外广泛使用的3个GIS时代的交通规划软件TransCAD、CUBE/Trips和Visum,从可用性、易用性和灵活性3个方面加以比较。从路网表现能力、数据存储、路阻函数、图形功能和模型功能等几个方面加以分析,总结3个软件的优缺点。TransCAD在图形分析和软件接口方面拥有较大的优势,CUBE/Trips在建模组织的系统性以及对建模数据的组织管理方面表现优秀,而Visum则是在分时段交通分析和界面组织方面略强。 展开更多
关键词 交通规划软件 TRANSCAD cube/Trips VISUM 对比分析
下载PDF
一种针对PRESENT的改进旁路Cube分析方法
17
作者 冀可可 王韬 +1 位作者 赵新杰 刘会英 《军械工程学院学报》 2012年第4期43-47,共5页
对PRESENT-80旁路Cube攻击进行了改进.基于第3轮单比特泄漏模型,在现有寻找密钥相关线性等式的基础上,通过获取非线性等式方法恢复出更多密钥位.实验结果表明:针对第1个s盒的第1位信息泄漏,2^7.67个选择明文即可恢复40位密钥,优... 对PRESENT-80旁路Cube攻击进行了改进.基于第3轮单比特泄漏模型,在现有寻找密钥相关线性等式的基础上,通过获取非线性等式方法恢复出更多密钥位.实验结果表明:针对第1个s盒的第1位信息泄漏,2^7.67个选择明文即可恢复40位密钥,优于现有的32位;针对第2,3,4个S盒的第1位信息泄漏,2^12.147个选择明文即可恢复64位密钥,优于现有的48位,将密钥搜索空间降低到2^16.此外,本方法可适用于PRESENT-128及其它轻型分组密码旁路Cube分析. 展开更多
关键词 旁路cube攻击 泄漏模型 非线性等式 PRESENT
下载PDF
基于多维数据库的CUBE优化算法
18
作者 熊东平 欧阳利军 李悛 《电脑知识与技术》 2006年第1期28-29,共2页
多维CUBE计算在多维分析和处理中非常重要,本文针对数组CUBE提出了划分的方法,通过一次扫描基本方体计算不完全数组方体的所有分组。实验数据表明该算法能充分利用内存空间、减少I/O次数,具有较高的计算效率。
关键词 多维分析 数组方体 cube算法
下载PDF
Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy
19
作者 曹培 张驰 +2 位作者 陆相君 陆海宁 谷大武 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第5期1132-1148,共17页
In the era of the Internet of Things,Bluetooth low energy(BLE/BTLE)plays an important role as a wellknown wireless communication technology.While the security and privacy of BLE have been analyzed and fixed several ti... In the era of the Internet of Things,Bluetooth low energy(BLE/BTLE)plays an important role as a wellknown wireless communication technology.While the security and privacy of BLE have been analyzed and fixed several times,the threat of side-channel attacks to BLE devices is still not well understood.In this work,we highlight a side-channel threat to the re-keying protocol of BLE.This protocol uses a fixed long term key for generating session keys,and the leakage of the long term key could render the encryption of all the following(and previous)connections useless.Our attack exploits the side-channel leakage of the re-keying protocol when it is implemented on embedded devices.In particular,we present successful correlation electromagnetic analysis and deep learning based profiled analysis that recover long term keys of BLE devices.We evaluate our attack on an ARM Cortex-M4 processor(Nordic Semiconductor nRF52840)running Nimble,a popular open-source BLE stack.Our results demonstrate that the long term key can be recovered within only a small amount of electromagnetic traces.Further,we summarize the features and limitations of our attack,and suggest a range of countermeasures to prevent it. 展开更多
关键词 Bluetooth low energy(BLE/BTLE) long term key re-keying protocol side-channel analysis
原文传递
Enhancing non-profiled side-channel attacks by time-frequency analysis
20
作者 Chengbin Jin Yongbin Zhou 《Cybersecurity》 EI CSCD 2023年第4期50-75,共26页
Side-channel analysis(SCA)has become an increasing important method to assess the physical security of cryptographic systems.In the process of SCA,the number of attack data directly determines the performance of SCA.W... Side-channel analysis(SCA)has become an increasing important method to assess the physical security of cryptographic systems.In the process of SCA,the number of attack data directly determines the performance of SCA.With sufficient attack data,the adversary can achieve a successful SCA.However,in reality,the cryptographic device may be protected with some countermeasures to limit the number of encryptions using the same key.In this case,the adversary cannot use casual numbers of data to perform SCA.The performance of SCA will be severely dropped if the attack traces are insufficient.In this paper,we introduce wavelet scatter transform(WST)and short-time fourier transform(STFT)to non-profiled side-channel analysis domains,to improve the performance of side-channel attacks in the context of insufficient data.We design a practical framework to provide suitable parameters for WST/STFT-based SCA.Using the proposed method,the WST/STFT-based SCA method can significantly enhance the performance and robustness of non-profiled SCA.The practical attacks against four public datasets show that the proposed method is able to achieve more robust performance.Compared with the original correlation power analysis(CPA),the number of attack data can be reduced by 50–95%. 展开更多
关键词 Correlation power analysis side-channel analysis Proposed attack framework Wavelet scatter transform Short-time fourier transform
原文传递
上一页 1 2 8 下一页 到第
使用帮助 返回顶部