期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Analysis on the Influence Factors of Wind Power Accommodation
1
作者 Xiaofei Li Yuehui Huang +2 位作者 Shuo Ma Changjun Li Xiaolei Ma 《Journal of Power and Energy Engineering》 2015年第4期162-169,共8页
With the increase of wind power capacity in China, the situation of curtailment of wind power is getting worse. An annual sequence production simulation model is established with maximum wind power consumption as the ... With the increase of wind power capacity in China, the situation of curtailment of wind power is getting worse. An annual sequence production simulation model is established with maximum wind power consumption as the objective function. The calculation of specific power grid operation in 2013 verifies the precision of this model. The impact of different factors on wind power accommodation as well as the impact of power grid reserve, wind resources and load on wind power curtailment is analyzed. The calculation results quantify the impact of different factors from power system to the accommodation of wind power and provide reference to solving the problem of wind power curtailment. 展开更多
关键词 WIND Power ACCOMMODATION Time SEQUENCE Simulation SPINNING RESERVE
下载PDF
A Generic TC-Based Method to Find the Weakness in Different Phases of Masking Schemes
2
作者 Ming Tang Yuguang Li +4 位作者 Yanbin Li Pengbo Wang Dongyan Zhao Weigao Chen Huanguo Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第5期574-585,共12页
Masking is one of the most commonly used Side-Channel Attack (SCA) countermeasures and is built on a security framework, such as the ISW framework, and ensures theoretical security through secret sharing. Unfortunat... Masking is one of the most commonly used Side-Channel Attack (SCA) countermeasures and is built on a security framework, such as the ISW framework, and ensures theoretical security through secret sharing. Unfortunately, the theoretical security cannot guarantee practical security, because several possible weaknesses may exist in the actual implementation. These weaknesses likely come from the masking schemes or are introduced by the implementation methods. Finding the possible weakness of the masking scheme is an interesting and important issue for real applications. In this paper, the possible weaknesses for masking schemes in Field- Programmable Gate Array (FPGA) design are discussed. It was found that the combinational circuit is the key to the security of masking schemes. The Toggle Count (TC) method and its extension are utilized to evaluate the security of masking schemes in the design phase and the implementation phase separately. Comparing different logic-level simulators for the Xilinx FPGA platform, the behavioral and post-translate simulations are considered as the analysis method in the design phase, while the post-map and the post-route simulations are used to find the weakness during the implementation phase. Moreover, a Standard Delay Format (SDF) based improvement scheme is proposed to significantly increase the effectiveness of the TC model. 展开更多
关键词 Side-Channel Attack (SCA) toggle count MASKING simulation-based analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部