期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm
1
作者 Mouna Bedoui Belgacem Bouallegue +4 位作者 Abdelmoty M.Ahmed Belgacem Hamdi Mohsen Machhout mahmoud M.Khattab 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2177-2193,共17页
Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validat... Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validated against these two types of attacks,taking into account a well-defined attacker model.This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm(ECDSA)algorithm.The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks.More precisely,we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against attacks concerning only a few bits of secret may be sufficient to recover the private key.ECDSA can be implemented in different ways,in software or via dedicated hardware or a mix of both.Many different architectures are therefore possible to implement an ECDSA-based system.For this reason,this work focuses mainly on the hardware implementation of the digital signature ECDSA.In addition,the proposed ECDSA architecture with and without fault detection for the scalar multiplication have been implemented on Xilinxfield programmable gate arrays(FPGA)platform(Virtex-5).Our implementation results have been compared and discussed.Our area,frequency,area overhead and frequency degradation have been compared and it is shown that the proposed architecture of ECDSA with fault detection for the scalar multiplication allows a trade-off between the hardware overhead and the security of the ECDSA. 展开更多
关键词 Elliptic curve cryptography(ECC) Montgomery ladder fault detection method fault injection attack digital signature ECDSA FPGA
在线阅读 下载PDF
化学示踪剂在IOR中的应用:实例研究
2
作者 mahmoud Asadi +3 位作者 Michael Shook 宋建平(译) 白振瑞(校) 《石油地质科技动态》 2011年第6期31-40,共10页
二次采油是把储层流体从注入井驱替到采油井的采油过程。这个过程成功与否很大程度上取决于对储层连续性和均质性(流体传导能力)的认识以及注入流体能够波及的储层体积。在任何注水或注气开发项目中,注入流体通过细微裂缝、断层或高... 二次采油是把储层流体从注入井驱替到采油井的采油过程。这个过程成功与否很大程度上取决于对储层连续性和均质性(流体传导能力)的认识以及注入流体能够波及的储层体积。在任何注水或注气开发项目中,注入流体通过细微裂缝、断层或高渗薄夹层窜流,都会产生诸如驱扫效率低下和油气采收率不高等问题。因此,认识注入井和生产井之间直接连通性以及储层的非均质性,对防止出现这些问题都有很大帮助。虽然地震成像、沉积地质研究和油藏模拟能够提供很多有价值的信息,可以用于确定二次采油项目的可行性,但是示踪剂测试是唯一能够提供有关注采井之间的直接连通性、流动通道和地层非均质性的技术手段。文中详细回顾了化学示踪剂在IOR中的应用,并介绍了在注水开发油田成功应用的一个实例。此外,还讨论了如何识别和解释直接连通性、评价地层非均质性和计算波及的孔隙体积。 展开更多
关键词 化学示踪剂 IOR 应用 实例 地层非均质性 注水开发油田 储层流体 二次采油
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部