期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
On The Numerical Solution of Two Dimensional Model of an Alloy Solidification Problem
1
作者 Moeiz Rouis Khaled Omrani 《Modeling and Numerical Simulation of Material Science》 2016年第1期1-9,共9页
In this paper, a linearized three level difference scheme is derived for two-dimensional model of an alloy solidification problem called Sivashinsky equation. Further, it is proved that the scheme is uniquely solvable... In this paper, a linearized three level difference scheme is derived for two-dimensional model of an alloy solidification problem called Sivashinsky equation. Further, it is proved that the scheme is uniquely solvable and convergent with convergence rate of order two in a discrete L<sup>∞</sup>-norm. At last, numerical experiments are carried out to support the theoretical claims. 展开更多
关键词 Solidification Problem Sivashinsky Equation Linearized Difference Scheme SOLVABILITY CONVERGENCE
下载PDF
A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm
2
作者 Mouna Bedoui Belgacem Bouallegue +4 位作者 Abdelmoty M.Ahmed Belgacem Hamdi Mohsen Machhout Mahmoud M.Khattab 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2177-2193,共17页
Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validat... Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validated against these two types of attacks,taking into account a well-defined attacker model.This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm(ECDSA)algorithm.The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks.More precisely,we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against attacks concerning only a few bits of secret may be sufficient to recover the private key.ECDSA can be implemented in different ways,in software or via dedicated hardware or a mix of both.Many different architectures are therefore possible to implement an ECDSA-based system.For this reason,this work focuses mainly on the hardware implementation of the digital signature ECDSA.In addition,the proposed ECDSA architecture with and without fault detection for the scalar multiplication have been implemented on Xilinxfield programmable gate arrays(FPGA)platform(Virtex-5).Our implementation results have been compared and discussed.Our area,frequency,area overhead and frequency degradation have been compared and it is shown that the proposed architecture of ECDSA with fault detection for the scalar multiplication allows a trade-off between the hardware overhead and the security of the ECDSA. 展开更多
关键词 Elliptic curve cryptography(ECC) Montgomery ladder fault detection method fault injection attack digital signature ECDSA FPGA
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部