The power attack of the hardware circuit is going through the steps of algorithm writen in FPGA,power consumption,data processing and *** order to solve the problem of the existing power attack experimental platform b...
详细信息
The power attack of the hardware circuit is going through the steps of algorithm writen in FPGA,power consumption,data processing and *** order to solve the problem of the existing power attack experimental platform because the processing steps are too scattered,feature complex operations and other issues,we've thus developed a higher degree of integration of the experimental *** advanced encryption standard(AES) algorithm is taken as an example to illustrate the whole process of implementing the correlation power analysis(CPA)attack on the experimental *** AES algorithm will be downloaded to the SAKURA-G experiment board,acquire the algorithm runtime power leakage,carry out the energy analysis because related attacks on information may leak location,and restore the AES first round of the first byte of the *** results show that the comprehensive experimental platform will integrate these steps into a platform,simplify the operation process,ensure the accuracy of power acquisition,realize the parallel data processing and improve the accuracy and efficiency of power attack.
The algorithm PRINCE proposed in ASIACRYPT 2012 is a lightweight cipher, currently suitable for the implementation on RFID Smart Card of the Io T. It's studied to achieve the optimal implementation of PRINCE encry...
详细信息
The algorithm PRINCE proposed in ASIACRYPT 2012 is a lightweight cipher, currently suitable for the implementation on RFID Smart Card of the Io T. It's studied to achieve the optimal implementation of PRINCE encryption algorithm, and to add a fixed random mask to enhance the anti power attacking ability of PRINCE. In this paper, we constructed the same operations into a module called Prince Round, and used counter to control the Prince Round module, while the same round operation runs repeatedly. As a result, it can save registers and effectively reduce the amount of computation. Furthermore, we used a special method by adding the random mask to S-box. The experimental results show that the optimized PRINCE occupies area 9.8% fewer than original PRINCE on FPGA and the encryption with a fixed random mask can run correctly. Last but not least, our research is the first one about the implementation of PRINCE algorithm on FPGA, and can serve as a reference for further application of IOT encryption.
Hoare logic is a logic used as a way of specifying semantics of programming languages, which has been extended to be a separation logic to reason about mutable heap structure. In a model M of Hoare logic, each program...
详细信息
Hoare logic is a logic used as a way of specifying semantics of programming languages, which has been extended to be a separation logic to reason about mutable heap structure. In a model M of Hoare logic, each program α induces an M-computable function fα M on the universe of M; and the M-recursive functions are defined on M. It will be proved that the class of all the M-computable functions fα M induced by programs is equal to the class of all the M- recursive functions. Moreover, each M-recursive function is ∑ 1 NM -definable in M, where the universal quantifier is a num- ber quantifier ranging over the standard part of a nonstandard model M.
Due to the diversification of software and hardware resources in cloud and ever-changing demand for deployment, Hadoop deployment is faced with great challenges in difficulty and complexity. Most of present researches...
详细信息
Due to the diversification of software and hardware resources in cloud and ever-changing demand for deployment, Hadoop deployment is faced with great challenges in difficulty and complexity. Most of present researches lie in environment configuration and parameter setting of deployment, they do not take into account diversification of infrastructure and scalability issues in cloud. In order to quickly customize, deploy and expand Hadoop services according to the demand, a model-driven approach to Hadoop deployment is proposed in the paper. Firstly, Hadoop demand and deployment models are presented. Secondly, the transformation method from the demand model to the deployment model is proposed. Thirdly, the bidirectional synchronization between Hadoop deployment model and running system is realized based on runtime model.
Previous researches on event relation classification primarily rely on lexical and syntactic features. In this paper, we use a Shallow Convolutional Neural Network (SCNN) to extract event-level and cross-event semanti...
详细信息
To solve the radio frequency identification problem,an anti-collision algorithm based on the Gray code(BSGC) was developed. The proposed algorithm reduces the effort required to search for tag prefixes in accordance w...
详细信息
To solve the radio frequency identification problem,an anti-collision algorithm based on the Gray code(BSGC) was developed. The proposed algorithm reduces the effort required to search for tag prefixes in accordance with Gray code regulations and enhances the identification speed through efficient division and branching of the collision tags. The results of simulation and subsequent analysis of the proposed algorithm confirm that it effectively reduces the number of collisions and transmission delays,enhances the throughput rate,and increases the tag identification efficiency.
Structure-preserved denoising of 3D magnetic resonance imaging (MRI) images is a critical step in medical image analysis. Over the past few years, many algorithms with impressive performances have been proposed. In th...
详细信息
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also b...
详细信息
ISBN:
(纸本)9789881404732
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also be used to access secret information of crypto chips, and thus threaten dramatically the security of the cipher keys. In this paper, we propose a secure scan DFT architecture to thwart scan-based side-channel attacks. This architecture provides the scan chain reset mechanism, and thus can prevent these attacks based on mode switching. Meanwhile, the secret key is isolated from scan chains of an advanced encryption standard (AES) design in the test mode. Therefore, it can also halt the test-mode-only scan attacks. The proposed secure scan DFT technique ensures the security without compromising the testability of original chip. Most important of all, the secure scan test is implemented with extremely low hardware overhead.
To facilitate scene understanding and robot navigation in large scale urban environment, a two-layer enhanced geometric map(EGMap) is designed using videos from a monocular onboard camera. The 2D layer of EGMap consis...
详细信息
To facilitate scene understanding and robot navigation in large scale urban environment, a two-layer enhanced geometric map(EGMap) is designed using videos from a monocular onboard camera. The 2D layer of EGMap consists of a 2D building boundary map from top-down view and a 2D road map, which can support localization and advanced map-matching when compared with standard polyline-based maps. The 3D layer includes features such as 3D road model,and building facades with coplanar 3D vertical and horizontal line segments, which can provide the 3D metric features to localize the vehicles and flying-robots in 3D space. Starting from the 2D building boundary and road map, EGMap is initially constructed using feature fusion with geometric constraints under a line feature-based simultaneous localization and mapping(SLAM) framework iteratively and progressively. Then, a local bundle adjustment algorithm is proposed to jointly refine the camera localizations and EGMap features. Furthermore, the issues of uncertainty, memory use, time efficiency and obstacle effect in EGMap construction are discussed and analyzed. Physical experiments show that EGMap can be successfully constructed in large scale urban environment and the construction method is demonstrated to be very accurate and robust.
Non-orthogonal multiple access (NOMA) has attracted much recent attention owing to its capability for improving the system spectral efficiency in wireless communications. Deploying NOMA in heterogeneous network can sa...
详细信息
暂无评论