With the increase of wind power capacity in China, the situation of curtailment of wind power is getting worse. An annual sequence production simulation model is established with maximum wind power consumption as the ...With the increase of wind power capacity in China, the situation of curtailment of wind power is getting worse. An annual sequence production simulation model is established with maximum wind power consumption as the objective function. The calculation of specific power grid operation in 2013 verifies the precision of this model. The impact of different factors on wind power accommodation as well as the impact of power grid reserve, wind resources and load on wind power curtailment is analyzed. The calculation results quantify the impact of different factors from power system to the accommodation of wind power and provide reference to solving the problem of wind power curtailment.展开更多
Masking is one of the most commonly used Side-Channel Attack (SCA) countermeasures and is built on a security framework, such as the ISW framework, and ensures theoretical security through secret sharing. Unfortunat...Masking is one of the most commonly used Side-Channel Attack (SCA) countermeasures and is built on a security framework, such as the ISW framework, and ensures theoretical security through secret sharing. Unfortunately, the theoretical security cannot guarantee practical security, because several possible weaknesses may exist in the actual implementation. These weaknesses likely come from the masking schemes or are introduced by the implementation methods. Finding the possible weakness of the masking scheme is an interesting and important issue for real applications. In this paper, the possible weaknesses for masking schemes in Field- Programmable Gate Array (FPGA) design are discussed. It was found that the combinational circuit is the key to the security of masking schemes. The Toggle Count (TC) method and its extension are utilized to evaluate the security of masking schemes in the design phase and the implementation phase separately. Comparing different logic-level simulators for the Xilinx FPGA platform, the behavioral and post-translate simulations are considered as the analysis method in the design phase, while the post-map and the post-route simulations are used to find the weakness during the implementation phase. Moreover, a Standard Delay Format (SDF) based improvement scheme is proposed to significantly increase the effectiveness of the TC model.展开更多
文摘With the increase of wind power capacity in China, the situation of curtailment of wind power is getting worse. An annual sequence production simulation model is established with maximum wind power consumption as the objective function. The calculation of specific power grid operation in 2013 verifies the precision of this model. The impact of different factors on wind power accommodation as well as the impact of power grid reserve, wind resources and load on wind power curtailment is analyzed. The calculation results quantify the impact of different factors from power system to the accommodation of wind power and provide reference to solving the problem of wind power curtailment.
基金supported in part by the National Natural Science Foundation of China under Grant (No. 61472292)the key technology research of new-generation high-speed and high-level security chip for smart grid (No. 526816160015)in part by the Technological Innovation of Hubei Province (Major Special Project, No. 2018AAA046)
文摘Masking is one of the most commonly used Side-Channel Attack (SCA) countermeasures and is built on a security framework, such as the ISW framework, and ensures theoretical security through secret sharing. Unfortunately, the theoretical security cannot guarantee practical security, because several possible weaknesses may exist in the actual implementation. These weaknesses likely come from the masking schemes or are introduced by the implementation methods. Finding the possible weakness of the masking scheme is an interesting and important issue for real applications. In this paper, the possible weaknesses for masking schemes in Field- Programmable Gate Array (FPGA) design are discussed. It was found that the combinational circuit is the key to the security of masking schemes. The Toggle Count (TC) method and its extension are utilized to evaluate the security of masking schemes in the design phase and the implementation phase separately. Comparing different logic-level simulators for the Xilinx FPGA platform, the behavioral and post-translate simulations are considered as the analysis method in the design phase, while the post-map and the post-route simulations are used to find the weakness during the implementation phase. Moreover, a Standard Delay Format (SDF) based improvement scheme is proposed to significantly increase the effectiveness of the TC model.