期刊文献+
共找到1,257篇文章
< 1 2 63 >
每页显示 20 50 100
Relation Between Both Sides of the Taiwan StraitsIn Anticipation of the Trends of Its Development
1
《China's Foreign Trade》 2002年第1期6-7,共2页
In the issue of January, 2002, the magazine "Relation Between Both Sides of the Taiwan Straits" published by the Association of the Relation Between the Both Sides of the Taiwan Straits, a signed essay was c... In the issue of January, 2002, the magazine "Relation Between Both Sides of the Taiwan Straits" published by the Association of the Relation Between the Both Sides of the Taiwan Straits, a signed essay was carried out, stating that the development of the relation between the both sides last year, anticipates the trends of such relation in the future. 展开更多
关键词 In Relation Between both sides of the taiwan StraitsIn Anticipation of the Trends of Its Development
下载PDF
Geomorphic Characteristics of Hillslope and Channelized Debris Flows: A Case Study in the Shitou Area of Central Taiwan 被引量:3
2
作者 Jinn-Chyi CHEN Ching-Weei LIN Lung-Chang WANG 《Journal of Mountain Science》 SCIE CSCD 2009年第3期266-273,共8页
The data on the hillslope and channelized debris flows in the Shitou area of central Taiwan occurred during Typhoons Toraji and Nali in 2001 were applied in this paper. The geomorphic parameters, including the flow le... The data on the hillslope and channelized debris flows in the Shitou area of central Taiwan occurred during Typhoons Toraji and Nali in 2001 were applied in this paper. The geomorphic parameters, including the flow length, gully gradient, drainage area and form factor of the debris flows were determined by spatial analysis using a Geographic Information System (GIS) based on the data derived from field investigation, aerial photographs, and topographical maps. According to such determined geomorphic parameters, the threshold conditions and empirical equations, such as the relationship between the gully gradient and drainage area and that between gully length and drainage area and topographic parameter, are presented and used to distinguish the geomorphic characteristics between the channelized and hillslope debris flows. 展开更多
关键词 坡面泥石流 地貌特征 中部地区 信道 石头 台湾 地理信息系统 流域面积
下载PDF
Volume transport in the East Taiwan Channel in response to diff erent tracks of typhoons as revealed by HYCOM data
3
作者 Yuanshou HE Po HU +2 位作者 Bing YANG Yuqi YIN Yijun HOU 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2022年第1期22-36,共15页
Northward infl ow through the East Taiwan Channel is vital in modulation of water exchange processes off northeastern Taiwan,China.In addition to the eff ects of the Kuroshio Current and westward-propagating oceanic m... Northward infl ow through the East Taiwan Channel is vital in modulation of water exchange processes off northeastern Taiwan,China.In addition to the eff ects of the Kuroshio Current and westward-propagating oceanic mesoscale eddies,the seas off eastern Taiwan,China,are frequently infl uenced by typhoons.Focusing on extrema of East Taiwan Channel volume transport(ETCVT)that appear within days of typhoon infl uence,this study investigated 124 historical cyclones including 91 typhoons that passed over the study sea area off eastern Taiwan,China.Based on 25-year HYbrid Coordinate Ocean Model(HYCOM)data,71%of short-term(within 10 d)ETCVT absolute values with>5 Sv occurred under the infl uence of typhoons crossing the study sea area,and the maximum short-term ETCVT extrema induced by typhoons were 12.5 and-10.9 Sv.The ETCVT extrema induced by typhoons showed reasonable positive correlation with typhoon wind speed.More importantly,the ETCVT extrema diff ered in response to diff erent typhoon tracks.Three types of typhoon were identifi ed based on their track and impact on ETCVT.Representative typhoon cases were examined to elucidate the specifi cs of each typical response.Based on historical best track data and HYCOM data,it was established that Type I typhoons caused the ETCVT to exhibit a negative extremum followed by a positive extremum.All Type I,II,and III typhoons tended to result in typical ETCVT fl uctuations in the surface mixing layer above the depth of 50-100 m,while Type II typhoons were more likely to induce ETCVT fl uctuations in the subsurface layer.The fi ndings of this study enhance understanding of ETCVT extrema that occur following typhoon passage,which is valuable for short-term physical-biogeochemical studies both in the study region and in areas downstream owing to the large net volume transport changes induced by typhoons. 展开更多
关键词 ocean modeling East taiwan channel volume transport extrema TYPHOON
下载PDF
TECTONIC CHARACTERISTICS OF TAIWAN CHANNEL AND ITS ENVIRONS IN LATE MESOZOIC
4
作者 汪新 《Chinese Journal of Oceanology and Limnology》 SCIE CAS CSCD 1994年第1期42-45,共4页
Taiwan Channel and environs developed typical collision structural zones in the Zhejiang-Fujian coast and Taiwan central mountain, analysis of which revealed their Late Mesozoic collision orogenesis.
关键词 taiwan channel COLLISION struaure COLLISION OROGENESIS Late MESOZOIC
下载PDF
UTILITY ANALYSIS AND EVALUATION METHOD STUDY OF SIDE CHANNEL INFORMATION 被引量:1
5
作者 Yan Yingjian Yu Jingchao +1 位作者 Guo Pengfei Guo Jianfei 《Journal of Electronics(China)》 2013年第5期500-508,共9页
In order to improve the efficiency and success rate of the side channel attack,the utility of side channel information of the attack object must be analyzed and evaluated before the attack implementation.Based on the ... In order to improve the efficiency and success rate of the side channel attack,the utility of side channel information of the attack object must be analyzed and evaluated before the attack implementation.Based on the study of side-channel attack techniques,a method is proposed in this paper to analyze and evaluate the utility of side channel information and the evaluation indexes of comentropy,Signal-to-Noise Ratio(SNR)are introduced.On this basis,the side channel information(power and electromagnetic)of a side channel attack experiment board is analyzed and evaluated,and the Data Encryption Standard(DES)cipher algorithm is attacked with the differential power attack method and differential electromagnetic attack method.The attack results show the effectiveness of the analysis and evaluation method proposed in this paper. 展开更多
关键词 Side-channel information Differential side-channel attack Comentropy Signal-to-Noise Ratio(SNR)
下载PDF
Elimination of Spatial Side-Channel Information for Compact Quantum Key Distribution Senders
6
作者 Wei-Shao Huang Wei Zhang Yi-Dong Huang 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第3期195-203,共9页
For a compact quantum key distribution (QKD) sender for the polarization encoding BB84 protocol, an eavesdropper could take a side-channel attack by measuring the spatial information of photons to infer their polariza... For a compact quantum key distribution (QKD) sender for the polarization encoding BB84 protocol, an eavesdropper could take a side-channel attack by measuring the spatial information of photons to infer their polarizations. The possibility of this attack can be reduced by introducing an aperture in the QKD sender, however, the effect of the aperture on the QKD security lacks of quantitative analysis. In this paper, we analyze the mutual information between the actual keys encoded at this QKD sender and the inferred keys at the eavesdropper (Eve), demonstrating the effect of the aperture to eliminate the spatial side-channel information quantitatively. It shows that Eve’s potential on eavesdropping spatial side-channel information is totally dependent on the optical design of the QKD sender, including the source arrangement and the aperture. The height of compact QKD senders with integrated light-emitting diode (LED) arrays could be controlled under several millimeters, showing great potential on applications in portable equipment. 展开更多
关键词 Diffraction-limited imaging system mutual INFORMATION quantum key distribution SPATIAL side-channel INFORMATION
下载PDF
Interaction of Ships within Navigable Ice Channel
7
作者 Vadim K. Goncharov Natalia Yu. Klementieva Kirill E. Sazonov 《Journal of Shipping and Ocean Engineering》 2014年第1期1-14,共14页
关键词 船舶碰撞 浮冰 渠道 通航 偏航力矩 负荷计算 侧向力 数学模型
下载PDF
Enhancing Security for Legacy Factory Machines: A Continuous Key Renewal Algorithm for Securing Group of Machines
8
作者 Nicolas Ferry Paul-Eric Dossou +1 位作者 Gabriel Ihowa Gaspard Laouenan 《Journal of Software Engineering and Applications》 2023年第12期714-743,共30页
Companies are generally focused on how to improve their global performance. Concepts, methods and tools are regularly used to transform them. Key performance indicators are used to measure how performance is increased... Companies are generally focused on how to improve their global performance. Concepts, methods and tools are regularly used to transform them. Key performance indicators are used to measure how performance is increased. Industry 4.0 concepts and sustainability expectations actually contribute to this performance improvement. Indeed, cybersecurity as one of these concepts is required to increase the company performance. Even if it is well-known and applied in companies through the protection of their information systems, progress is expected in research on how to ensure the security of data and factory processes in the manufacturing, as the number of cyberattacks towards industries is growing these last few years. This paper aims to increase the company performance and sustainability to enforce factory machines protection by creating private security network groups. But currently, most of the Programmable Logic Controller PLC protocols have not been securely designed. Thus, the creation of secure groups of machines by combining strong authentication, strong or lightweight ciphering, and data stream integrity is proposed. The security is enforced by a continuous key’s renewal algorithm. An experiment on an industry’s architecture has been led to validate the concepts of the proposition. The study is compared to existing OPC-UA and MACsec standards in terms of drawbacks and advantages. This work could be implemented in hardware for further performance improvement. 展开更多
关键词 Sustainable Industries CYBERSECURITY Networks Protocols Side-channel Analysis
下载PDF
基于多源数据聚合的神经网络侧信道攻击
9
作者 张润莲 潘兆轩 +2 位作者 李金林 武小年 韦永壮 《计算机研究与发展》 EI CSCD 北大核心 2024年第1期261-270,共10页
基于深度学习的侧信道攻击需要针对密码算法的每一个密钥字节建模并训练,数据采集和模型训练开销大.针对该问题,提出一种基于多源数据聚合的神经网络侧信道攻击方法.为筛选具有良好泛化效果的密钥字节泄露数据进行数据聚合,以AES-128算... 基于深度学习的侧信道攻击需要针对密码算法的每一个密钥字节建模并训练,数据采集和模型训练开销大.针对该问题,提出一种基于多源数据聚合的神经网络侧信道攻击方法.为筛选具有良好泛化效果的密钥字节泄露数据进行数据聚合,以AES-128算法为例,先基于16个密钥字节的泄露数据训练16个单密钥字节模型,分别实现对16个密钥字节的恢复;其次,设计一种打分机制评估各单密钥字节模型的泛化效果,通过得分排序筛选出对各密钥字节恢复效果最好的单密钥字节模型;最后,以筛选模型所对应的各密钥字节泄露数据集构建多源数据聚合模型进行训练,实现密钥恢复.实验测试结果表明,多源数据聚合模型具有良好的泛化效果,有效提高了密钥恢复的准确率和效率,降低了恢复密钥所需的能量迹数量,其在采集能量迹较少的情况下依然具有较好的攻击效果. 展开更多
关键词 侧信道攻击 神经网络 打分机制 数据聚合 数据标签
下载PDF
Hardware Security for IoT in the Quantum Era: Survey and Challenges
10
作者 Doudou Dione Boly Seck +3 位作者 Idy Diop Pierre-Louis Cayrel Demba Faye Ibrahima Gueye 《Journal of Information Security》 2023年第4期227-249,共23页
The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing s... The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing services that rely on an IoT infrastructure. Thus, ensuring the security of devices during operation and information exchange becomes a fundamental requirement inherent in providing safe and reliable IoT services. NIST requires hardware implementations that are protected against SCAs for the lightweight cryptography standardization process. These attacks are powerful and non-invasive and rely on observing the physical properties of IoT hardware devices to obtain secret information. In this paper, we present a survey of research on hardware security for the IoT. In addition, the challenges of IoT in the quantum era with the first results of the NIST standardization process for post-quantum cryptography are discussed. 展开更多
关键词 IOT Hardware Security Side-channel Attacks Post-Quantum Cryptography NIST
下载PDF
基于最大均值差异的能量侧信道泄露量化评估
11
作者 洪亮 翟元洁 +2 位作者 王嘉熙 郑健 胡伟 《计算机学报》 EI CAS CSCD 北大核心 2024年第6期1355-1371,共17页
能量侧信道分析是通过对密码设备运行时的能量消耗进行分析,推导出运行时的操作及操作涉及的敏感中间值.对密码设备进行能量泄露量化评估是分析密码设备信息泄露程度的重要手段,目前主流的评估方案主要关注于能量迹上单个样本点的泄露,... 能量侧信道分析是通过对密码设备运行时的能量消耗进行分析,推导出运行时的操作及操作涉及的敏感中间值.对密码设备进行能量泄露量化评估是分析密码设备信息泄露程度的重要手段,目前主流的评估方案主要关注于能量迹上单个样本点的泄露,并未充分考虑高阶攻击模型下的泄露评估问题,对于采用掩码防御措施的密码芯片来说,一旦发生泄露,通常表现为多变量联合泄露,因此采用传统的单样本点方法进行泄露评估会存在假阴性的问题.本文研究多点联合泄露评估问题,引入最大均值差异方法,提取能量迹的多变量联合特征,构建基于最大均值差异的能量泄露量化评估模型,提供了一种有效的能量侧信道泄露量化评估方法.通过实现无防御对策和有防御对策的AES算法,使用DPA contest v2、ASCAD v1和自采能量迹数据集进行实验,结果表明,基于最大均值差异的泄露量化评估方法能够有效降低单样本点检测方法出现假阴性的风险,HAC、MTD和Bartlett-F检验的对照结果也进一步验证了该方法的有效性. 展开更多
关键词 能量侧信道 信息泄露 量化评估 最大均值差异 掩码 AES
下载PDF
PRIDE轻量级密码的不可能统计故障分析
12
作者 李玮 孙文倩 +2 位作者 谷大武 张爱琳 温云华 《通信学报》 EI CSCD 北大核心 2024年第1期141-151,共11页
针对2014年美密会上提出的PRIDE轻量级密码的实现安全,提出了面向唯密文攻击假设的新型不可能统计故障分析方法,设计了卡方拟合优度-汉明重量区分器、卡方拟合优度-极大似然估计区分器等新型区分器。所提方法基于随机半字节故障模型,结... 针对2014年美密会上提出的PRIDE轻量级密码的实现安全,提出了面向唯密文攻击假设的新型不可能统计故障分析方法,设计了卡方拟合优度-汉明重量区分器、卡方拟合优度-极大似然估计区分器等新型区分器。所提方法基于随机半字节故障模型,结合统计分布状态和不可能关系分析,围绕导入故障前后中间状态的变化,最少仅需432个故障即可恢复出PRIDE算法的128 bit原始密钥,且成功率达99%及以上。实验分析表明,所提方法不仅能减少故障数和耗时,而且进一步提升了准确率。该结果对轻量级密码的实现安全性提供了重要参考。 展开更多
关键词 侧信道分析 不可能统计故障分析 轻量级密码 PRIDE 智能无人系统
下载PDF
蜂窝车联网侧行链路信道测量与分析
13
作者 代亮 王宁 +3 位作者 白浩男 宁耀军 孟芸 许宏科 《电波科学学报》 CSCD 北大核心 2024年第2期361-370,共10页
蜂窝车联网侧行链路接口(PC5)采用终端到终端直接通信的形式,因其通信延迟低、传输容量大和传输可靠性高的特点而具备广阔的科研和工程前景。为了实测蜂窝车联网侧行链路信道特性,使用具有PC5接口的车载板卡在城市道路进行了通信测量工... 蜂窝车联网侧行链路接口(PC5)采用终端到终端直接通信的形式,因其通信延迟低、传输容量大和传输可靠性高的特点而具备广阔的科研和工程前景。为了实测蜂窝车联网侧行链路信道特性,使用具有PC5接口的车载板卡在城市道路进行了通信测量工作,并依据测量结果从信道特征对PC5接口信道进行了分析。分析了通信收包时延随距离和信噪比变化的特征,将实测参考信号接收功率值与自由空间和双射线两种路径损耗经验模型及对数距离和双斜率两种路径损耗拟合模型的预测值进行了对比,并引入了四种相关性分析算法,从数值偏移量、线性相关程度和几何形态相似度等角度分析了模型预测值与实测数据的关联性,最终验证了双斜率路径损耗模型最适合表征PC5接口通信信道在城市环境下的衰落特征,基于该模型测算得到的路径损耗指数和阴影衰落方差也进一步说明此模型能够更好地结合实验环境表征信道特性。 展开更多
关键词 蜂窝车联网 侧行链路 信道测量 路径损耗模型 相关性分析
下载PDF
基于部分能量耦合线圈的无线能量与信号同步传输方法研究
14
作者 靖永志 谯柯 +3 位作者 付康 杨亮涛 刘沁宇 刘国清 《电机与控制学报》 EI CSCD 北大核心 2024年第7期43-54,共12页
针对无线电能传输系统中能量发送端与接收端进行全双工通信的需求,提出一种基于部分能量耦合线圈的无线能量与信号同步传输方法。利用能量耦合线圈的内侧和外侧部分线圈分别作为信号正反向传输耦合机构,并在信号接收回路中采用LC并联支... 针对无线电能传输系统中能量发送端与接收端进行全双工通信的需求,提出一种基于部分能量耦合线圈的无线能量与信号同步传输方法。利用能量耦合线圈的内侧和外侧部分线圈分别作为信号正反向传输耦合机构,并在信号接收回路中采用LC并联支路抑制同侧信号载波的串扰。通过构建系统模型,分析能量传输与信号传输的增益以及系统传输干扰,得到系统参数对传输特性影响规律。为提高信号传输增益以及减小信号正反向传输之间的串扰,优化了耦合机构线圈布置方案。最后,搭建了传输功率为20 W的无线能量与信号全双工同步传输平台,实验结果表明,在电能传输不受影响的同时,实现了正向传输速率200 kbps、反向传输速率400 kbps的信号全双工同步传输,验证了所提方法的可靠性和有效性。 展开更多
关键词 无线电能传输 双边LCC补偿 共享通道传输 全双工通信 载波调制 ASK
下载PDF
侧通道泵结构设计方法初探
15
作者 吴玉珍 邓亮 《化工设备与管道》 CAS 北大核心 2024年第3期64-69,共6页
文章结合工程实际需要,对比分析了侧通道泵的结构型式和工作原理,在此基础上建立了部分流式切线离心泵扬程系数与侧通道泵扬程系数的关系;根据离心泵的设计流程和设计方法,以计算案例的形式给出了侧通道泵几何结构参数设计方法,依据此... 文章结合工程实际需要,对比分析了侧通道泵的结构型式和工作原理,在此基础上建立了部分流式切线离心泵扬程系数与侧通道泵扬程系数的关系;根据离心泵的设计流程和设计方法,以计算案例的形式给出了侧通道泵几何结构参数设计方法,依据此设计方法获得的几何参数,绘制了单级侧通道泵结构图。几何结构参数设计是现代泵设计的第一步,文章设计方法的初步形成,为侧通道泵产品的设计、进一步的结构优化、性能提升奠定了基础。 展开更多
关键词 侧通道泵 几何参数 结构设计 扬程系数
下载PDF
汽车后大灯镜壳大型薄壁精密注塑模设计
16
作者 张维合 邓成林 +2 位作者 闫丽静 胥永林 冯婧 《塑料》 CAS CSCD 北大核心 2024年第1期178-182,188,共6页
根据汽车后大灯镜壳的结构特点,设计了一副大型薄壁精密注塑模具。模具采用定模成型内表面、动模成型外表面及动模侧向抽芯机构,有效地解决了成型塑件脱模困难问题;模具采用三级定位机构,显著提高了模具刚度和寿命;模具采用随形水路温... 根据汽车后大灯镜壳的结构特点,设计了一副大型薄壁精密注塑模具。模具采用定模成型内表面、动模成型外表面及动模侧向抽芯机构,有效地解决了成型塑件脱模困难问题;模具采用三级定位机构,显著提高了模具刚度和寿命;模具采用随形水路温度控制系统,成型周期降低了10%,成型塑件最大变形量下降了20%,成型塑件的尺寸精度达到了设计要求的MT3;模具采用推杆先复位机构,有效地消除了滑块和推杆汽相撞的风险,保证了侧向抽芯机构安全可靠。模具投产后运行平稳,成型塑件尺寸稳定。 展开更多
关键词 汽车后大灯镜壳 大型薄壁精密注塑模具 三级定位机构 随形水路 侧向抽芯机构 先复位机构
下载PDF
深厚冲积层薄基岩条件下沿空留巷支护技术研究
17
作者 王应德 荣阳阳 +1 位作者 和平 陈新明 《煤炭技术》 CAS 2024年第2期17-22,共6页
为解决某矿16041工作面原支护方案沿空留巷变形大、破坏严重难题,提出了顶板采用“16#槽钢梁+注浆锚索”、采空区侧采用“36U型钢+注浆锚杆”不对称耦合支护优化方案,基于理论分析研究围岩结构破坏形式,通过单元荷载法计算了留巷顶板与... 为解决某矿16041工作面原支护方案沿空留巷变形大、破坏严重难题,提出了顶板采用“16#槽钢梁+注浆锚索”、采空区侧采用“36U型钢+注浆锚杆”不对称耦合支护优化方案,基于理论分析研究围岩结构破坏形式,通过单元荷载法计算了留巷顶板与采空区侧围岩应力,最后开展工业性应用,验证优化后方案的合理性。研究表明:优化后支护方案顶板和采空区侧计算单元面荷载分别为351.85 kPa和206.53 kPa;注浆锚索和注浆锚杆承载力分别为263.89 kN和199.08 kN,均小于注浆锚索(锚杆)极限承载力。根据对留巷数据监测,最大顶板下沉量为35.6 mm,较原支护方案减小了1.40倍;采空区侧最大移近量为29.6 mm,与较原支护方案减小了4.13倍;最大注浆锚索承载力为253 kN,与理论计算值误差为4.1%;最大注浆锚杆承载力为174 kN,与理论计算值误差为12.6%。位移量与支护承载力均在工程允许范围内,优化后方案支护效果良好。 展开更多
关键词 沿空留巷 U型钢+注浆锚杆 槽钢梁+注浆锚索 极限承载力
下载PDF
一种基于模板的RSA-CRT模约减攻击方法
18
作者 马向亮 乌力吉 +3 位作者 王宏 张向民 黄克振 刘玉岭 《电子学报》 EI CAS CSCD 北大核心 2024年第3期689-695,共7页
目前针对RSA-CRT的建模类攻击研究较少,本文以模约减操作为研究对象,提出了一种针对RSA-CRT实现的模板攻击方法.该方法的核心是解决了如何由模约减后中间值的汉明重量恢复RSA-CRT私钥的难题.该方法的特点是基于模约减后中间值的汉明重... 目前针对RSA-CRT的建模类攻击研究较少,本文以模约减操作为研究对象,提出了一种针对RSA-CRT实现的模板攻击方法.该方法的核心是解决了如何由模约减后中间值的汉明重量恢复RSA-CRT私钥的难题.该方法的特点是基于模约减后中间值的汉明重量模型建模,通过采集选择密文模约减的能量迹进行模板匹配获取模约减后中间值的汉明重量,由汉明重量变化值恢复中间值,进一步恢复RSA-CRT算法的私钥.另外,该方法的优点在于理想情况下,基于中间值汉明重量模型建立的模板之间可以共用,且对中间值以多少位大小建模没有限制,可以选择字节大小,64位大小,甚至私钥p相同大小,实际环境中可根据泄露信息情况进行选取.最后,本文选择对中间值的最低字节进行建模,验证了该方法的可行性,并给出了防护建议. 展开更多
关键词 模板攻击 RSA-CRT 选择密文 模约减 侧信道攻击
下载PDF
面向SIMD指令集的SM4算法比特切片优化
19
作者 王闯 丁滟 +1 位作者 黄辰林 宋连涛 《计算机研究与发展》 EI CSCD 北大核心 2024年第8期2097-2109,共13页
SM4算法是中国自主设计的商用分组密码算法,其加解密计算性能成为影响信息系统数据机密性保障的重要因素之一.现有SM4算法优化主要面向硬件设计和软件查表等方向展开研究,分别存在依赖特定硬件环境、效率低下且易遭受侧信道攻击等问题.... SM4算法是中国自主设计的商用分组密码算法,其加解密计算性能成为影响信息系统数据机密性保障的重要因素之一.现有SM4算法优化主要面向硬件设计和软件查表等方向展开研究,分别存在依赖特定硬件环境、效率低下且易遭受侧信道攻击等问题.比特切片技术通过对输入数据重组实现了并行化高效分组密码处理,可以抵御针对缓存的侧信道攻击.然而现有切片分组密码研究对硬件平台相关性强、处理器架构支持单一,并且并行化处理流水启动较慢,面向小规模数据的加解密操作难以充分发挥单指令多数据(single instruction multiple data,SIMD)等先进指令集的优势.针对上述问题,首先提出了一种跨平台的通用切片分组密码算法模型,支持面向不同的处理器指令字长提供一致化的通用数据切片方法.在此基础上,提出了一种面向SIMD指令集的细粒度切片并行处理SM4优化算法,通过细粒度明文切片重组与线性处理优化有效缩短算法启动时间.实验结果表明,相比通用SM4算法,优化的SM4比特切片算法加密速率最高可达438.0 MBps,加密每字节所需的时钟周期最快高达7.0 CPB(cycle/B),加密性能平均提升80.4%~430.3%. 展开更多
关键词 SM4算法 性能优化 比特切片 侧信道攻击 SIMD指令集
下载PDF
针对ZUC算法硬件实现的相关能量攻击与多粒度时域敏感区域检测
20
作者 吴一 赵昱霖 +5 位作者 潘雨洋 马哲 李彦昭 彭乾 乌力吉 张向民 《密码学报(中英文)》 CSCD 北大核心 2024年第3期637-648,共12页
本文通过合理分解模加操作,优化流水线结构,构建ZUC算法硬件实现,并基于FPGA开发板搭建ZUC算法功耗采集平台.构建粗细粒度时域敏感区域的泄漏检测方法,利用移动平均算子,发掘高信噪比风险区域,采用自相关滤波器与峰值检测算子,发掘具有... 本文通过合理分解模加操作,优化流水线结构,构建ZUC算法硬件实现,并基于FPGA开发板搭建ZUC算法功耗采集平台.构建粗细粒度时域敏感区域的泄漏检测方法,利用移动平均算子,发掘高信噪比风险区域,采用自相关滤波器与峰值检测算子,发掘具有明显重复特征的运算区间,并对泄漏高风险区域进行标定,实现高精度的泄漏风险定位.通过分析ZUC算法的脆弱性,本文提出一种基于选择初始向量IV的CPA攻击方案,对输入的IV信息进行选择,通过固定部分明文的方法有效提高采集信号的信噪比,并采集实际3000条功耗曲线,在算法初始化首轮,成功提取8 bit密钥信息,从而证明该方案的有效性,对ZUC算法的硬件实现进行侧信道防护是必要的.总结ZUC算法侧信道防护方案,对比方案优劣. 展开更多
关键词 ZUC 相关能量分析 侧信道攻击
下载PDF
上一页 1 2 63 下一页 到第
使用帮助 返回顶部