咨询与建议

限定检索结果

文献类型

  • 16 篇 期刊文献

馆藏范围

  • 16 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13 篇 工学
    • 7 篇 电子科学与技术(可...
    • 4 篇 网络空间安全
    • 2 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 计算机科学与技术...
    • 1 篇 交通运输工程
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 园艺学

主题

  • 16 篇 power analysis
  • 3 篇 combinational lo...
  • 2 篇 side channel att...
  • 1 篇 delay analysis
  • 1 篇 sample size
  • 1 篇 correlation powe...
  • 1 篇 circuit simulati...
  • 1 篇 feedback shift r...
  • 1 篇 boolean function
  • 1 篇 differential pow...
  • 1 篇 cryptographic ha...
  • 1 篇 sub clock method
  • 1 篇 simulation
  • 1 篇 stepped wedge
  • 1 篇 math model
  • 1 篇 leakage power an...
  • 1 篇 srg
  • 1 篇 exciting mode
  • 1 篇 s-boxes
  • 1 篇 cryptograph

机构

  • 3 篇 shanghai huahong...
  • 3 篇 school of electr...
  • 2 篇 shanghai viewsou...
  • 1 篇 government colle...
  • 1 篇 department of po...
  • 1 篇 department of ec...
  • 1 篇 state key labora...
  • 1 篇 复旦大学
  • 1 篇 institute of cro...
  • 1 篇 tsinghua nationa...
  • 1 篇 institute of mic...
  • 1 篇 china informatio...
  • 1 篇 information tech...
  • 1 篇 beijing jiaotong...
  • 1 篇 school of comput...
  • 1 篇 research center ...
  • 1 篇 school of electr...
  • 1 篇 collegeofelectri...
  • 1 篇 department of ap...
  • 1 篇 department of st...

作者

  • 3 篇 gu dawu
  • 3 篇 guo zheng
  • 3 篇 liu junrong
  • 2 篇 bao sigang
  • 2 篇 lu haining
  • 2 篇 gu haihua
  • 1 篇 赵文庆
  • 1 篇 jiankang wang
  • 1 篇 缪建东
  • 1 篇 liji wu
  • 1 篇 xie di
  • 1 篇 qu kaige
  • 1 篇 朱念好
  • 1 篇 yanting ren
  • 1 篇 ren yanting
  • 1 篇 ranranli
  • 1 篇 张慧
  • 1 篇 yu yu
  • 1 篇 hongyi chen
  • 1 篇 wu liji

语言

  • 13 篇 英文
  • 3 篇 中文
检索条件"主题词=power analysis"
16 条 记 录,以下是1-10 订阅
排序:
Key Recovery Against 3DES in CPU Smart Card Based on Improved Correlation power analysis
收藏 引用
Tsinghua Science and Technology 2016年 第2期21卷 210-220页
作者: Yanting Ren Liji Wu Hexin Li Xiangyu Li Xiangmin Zhang An Wang Hongyi Chen Tsinghua National Laboratory for Information Science and Technology(TNList)and the Institute of Microelectronics Tsinghua UniversityBeijing 100084China China Information Technology Security Evaluation Center(CNITSEC) Beijing 100085China School of Computer Science&Technology Beijing Institute of TechnologyBeijing 100081China
The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Design of Feedback Shift Register of Against power analysis Attack
收藏 引用
Computers, Materials & Continua 2019年 第2期58卷 517-527页
作者: Yongbin Zhao XuYang RanranLi School of Information Science and Technology Shijiazhuang Tiedao UniversityShijiazhuangChina
Stream ciphers based on linear feedback shift register(LFSR)are suitable for constrained environments,such as satellite communications,radio frequency identification devices tag,sensor networks and Internet of Things,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Method for power analysis Based on Combinational Logic in Block Cipher Circuit
收藏 引用
Chinese Journal of Electronics 2014年 第1期23卷 151-156页
作者: GUO Zheng GU Dawu YUAN Kan LIU Junrong HE Yuming School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai Huahong Integrated Circuit Co. Ltd.
In this paper, we propose a method that builds power model template according to input transitions of combinatorial logic circuit. By computing its correlation with the overall power consumption of a cryptographic cir... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Combinational power analysis Method against Cryptographic Hardware
收藏 引用
China Communications 2015年 第1期12卷 99-107页
作者: GUO Zheng GU Dawu LU Haining LIU Junrong XU Sen BAO Sigang GU Haihua School of Electronic Information and Electrical Engineering Shanghai JiaoTong University Shanghai Viewsource Information Science & Technology Co. Ltd. Shanghai Huahong Integrated Circuit Co. Ltd.
power analysis is a non-invaslve attack against cryptographic hardware, which effectively exploits runtime power consumption characteristics of circuits. This paper proposes a new power model which combines Hamming Di... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Standard Cell-Based Leakage power analysis Attack Countermeasure Using Symmetric Dual-Rail Logic
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2014年 第2期19卷 169-172页
作者: 朱念好 周玉洁 刘红明 School of Electronic Information and Electrical Engineering Shanghai Jiaotong University
Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the lea... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Sample size and power analysis for stepped wedge cluster randomised trials with binary outcomes
收藏 引用
Statistical Theory and Related Fields 2021年 第2期5卷 162-169页
作者: Jijia Wang Jing Cao Song Zhang Chul Ahn Department of Applied Clinical Research UT Southwestern Medical CenterDallasTXUSA Department of Statistical Science Southern Methodist UniversityDallasTXUSA Department of Population and Data Sciences UT Southwestern Medical CenterDallasTXUSA
In stepped wedge cluster randomised trials(SW-CRTs),clusters of subjects are randomly assigned to sequences,where they receive a specific order of *** to conventional cluster randomised studies,one unique feature of S... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Multi-user rate and power analysis in a cognitive radio network with massive multi-input multi-output
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2018年 第5期19卷 674-684页
作者: Shang LIU Ishtiaq AHMAD Ping ZHANG Zhi ZHANG State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Department of Electrical Engineering University of Lahore
This paper discusses transmission performance and power allocation strategies in an underlay cognitive radio (CR) network that contains relay and massive multi-input multi-output (MIMO). The downlink transmission ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Statistical power of Inclusive Composite Interval Mapping in Detecting Digenic Epistasis Showing Common F_2 Segregation Ratios
收藏 引用
Journal of Integrative Plant Biology 2012年 第4期54卷 270-279页
作者: Luyan Zhang Huihui Li Jiankang Wang Institute of Crop Sciences The National Key Facility for Crop Gene Resources and Genetic Improvementand CIMMYT ChinaChinese Academy of Agricultural SciencesBeijing 100081China
Epistasis is a commonly observed genetic phenomenon and an important source of variation of complex traits, which could maintain additive variance and therefore assure the long-term genetic gain in breeding. Inclusive... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Novel Masking Scheme for SM3 Based MAC
收藏 引用
China Communications 2015年 第6期12卷 11-21页
作者: QU Kaige WU Liji WANG An REN Yanting ZHANG Xiangmin Tsinghua National Laboratory for Information Science and Technology(TNList) Tsinghua University Institute of Microelectronics Tsinghua University
The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authen... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Unified Method Based on SPA and Timing Attacks on the Improved RSA
收藏 引用
China Communications 2016年 第4期13卷 89-96页
作者: JIA Fan XIE Di Beijing Jiaotong University China Information Technology & Security Test and Evaluation Center Beijing China
Nowadays the modular multiplications in many kinds of smartcards are utilized Montgomery's algorithm modular multiplier, so traditional SPA to RSA becomes invalid. An improved attack method is proposed based on SPA wh... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论