Average power analysis plays a crucial role in the design of large-scale digital integrated circuits(ICs).The integration of data-driven machine learning(ML)methods into the electronic design automation(EDA)fields has...Average power analysis plays a crucial role in the design of large-scale digital integrated circuits(ICs).The integration of data-driven machine learning(ML)methods into the electronic design automation(EDA)fields has increased the demand for extensive datasets.To address this need,we propose a novel pseudo-circuit generation algorithm rooted in graph topology.This algorithm efficiently produces a multitude of power analysis examples by converting randomly generated directed acyclic graphs(DAGs)into gate-level Verilog pseudo-combinational circuit netlists.The subsequent introduction of register units transforms pseudo-combinational netlists into pseudo-sequential circuit netlists.Hyperparameters facilitate the control of circuit topology,while appropriate sequential constraints are applied during synthesis to yield a pseudo-circuit dataset.We evaluate our approach using the mainstream power analysis software,conducting pre-layout average power tests on the generated circuits,comparing their performance against benchmark datasets,and verifying the results through circuit topology complexity analysis and static timing analysis(STA).The results confirm the effectiveness of the dataset,and demonstrate the operational efficiency and robustness of the algorithm,underscoring its research value.展开更多
Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the lea...Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor.展开更多
Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key de...Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key degeneration and slow evolution within populations.These challenges significantly hinder key recovery efforts.This paper proposes a screening correlation power analysis framework combined with a genetic algorithm,named SFGA-CPA,to address these issues.SFGA-CPA introduces three operations designed to exploit CPA characteris-tics:propagative operation,constrained crossover,and constrained mutation.Firstly,the propagative operation accelerates population evolution by maximizing the number of correct bytes in each individual.Secondly,the constrained crossover and mutation operations effectively address key degeneration by preventing the compromise of correct bytes.Finally,an intelligent search method is proposed to identify optimal parameters,further improving attack efficiency.Experiments were conducted on both simulated environments and real power traces collected from the SAKURA-G platform.In the case of simulation,SFGA-CPA reduces the number of traces by 27.3%and 60%compared to CPA based on multiple screening methods(MS-CPA)and CPA based on simple GA method(SGA-CPA)when the success rate reaches 90%.Moreover,real experimental results on the SAKURA-G platform demonstrate that our approach outperforms other methods.展开更多
Differential Power Analysis (DPA) is an effective attack method to break the crypto chips and it has been considered to be a threat to security of information system. With analyzing the prin-ciple of resisting DPA,an ...Differential Power Analysis (DPA) is an effective attack method to break the crypto chips and it has been considered to be a threat to security of information system. With analyzing the prin-ciple of resisting DPA,an available countermeasure based on randomization is proposed in this paper. Time delay is inserted in the operation process and random number is precharged to the circuit during the delay time,the normal schedule is disturbed and the power is randomized. Following this meth-odology,a general DPA resistance random precharge architecture is proposed and DES algorithm following this architecture is implemented. This countermeasure is testified to be efficient to resist DPA.展开更多
Power analysis is a non-invaslve attack against cryptographic hardware, which effectively exploits runtime power consumption characteristics of circuits. This paper proposes a new power model which combines Hamming Di...Power analysis is a non-invaslve attack against cryptographic hardware, which effectively exploits runtime power consumption characteristics of circuits. This paper proposes a new power model which combines Hamming Distance model and the model based on the template value of power consumption in combinational logic circuit. The new model can describe the power consumption characteristics of sequential logic circuits and those of combinational logic as well. The new model can be used to improve the existing power analysis methods and detect the information leakage of power consumption. Experimental results show that, compared to CPA(Correlation Power Analysis) method, our proposed attack which adopt the combinational model is more efficient in terms of the number of required power traces.展开更多
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the informat...The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the information by observing the power consumption,electromagnetic(EM)field,timing analysis,and acoustics of the device.Later,the attackers perform statistical functions to recover the key.Advanced Encryption Standard(AES)algorithm has proved to be a good security solution for constrained IoT devices.This paper implements a simulation model which is used to modify theAES algorithm using logicalmasking properties.This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES.This model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB simulator.Results will give better solution by hiding power profiles of the IoT devices against PAAs.In future,the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic(WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array(FPGA).展开更多
Stream ciphers based on linear feedback shift register(LFSR)are suitable for constrained environments,such as satellite communications,radio frequency identification devices tag,sensor networks and Internet of Things,...Stream ciphers based on linear feedback shift register(LFSR)are suitable for constrained environments,such as satellite communications,radio frequency identification devices tag,sensor networks and Internet of Things,due to its simple hardware structures,high speed encryption and lower power consumption.LFSR,as a cryptographic primitive,has been used to generate a maximum period sequence.Because the switching of the status bits is regular,the power consumption of the LFSR is correlated in a linear way.As a result,the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks.In this paper,a new design of LFSR against power attacks is proposed.The power consumption characteristics of LFSR can be masked by using an additional LFSR and confused by adding a new filter Boolean function and a flip-flop.The design method has been implemented easily by circuits in this new design in comparison with the others.展开更多
Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.Th...Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.The masking strategies in algorithm level view each S-Box as an independent moduleand mask them respectively,which are costly in size and power for non-linear characteristic of S-Boxes.The new method uses dynamic inhomogeneous S-Boxes instead of traditional homogeneous S-Boxes,andarranges the S-Boxes randomly.So the power and data path delay of substitution unit become unpre-dictable.The experimental results demonstrate that this scheme takes advantages of the circuit character-istics of various S-Box implementations to eliminate the correlation between crypto operation and power.Itneeds less extra circuits and suits resource constrained applications.展开更多
During the standardisation process of post-quantum cryptography,NIST encourages research on side-channel analysis for candidate schemes.As the recommended lattice signature scheme,CRYSTALS-Dilithium,when implemented o...During the standardisation process of post-quantum cryptography,NIST encourages research on side-channel analysis for candidate schemes.As the recommended lattice signature scheme,CRYSTALS-Dilithium,when implemented on hardware,has seen limited research on side-channel analysis,and current attacks are incomplete or requires a substantial quantity of traces.Therefore,we conducted a more complete analysis to investigate the leakage of an FPGA implementation of CRYSTALS-Dilithium using the Correlation Power Analysis(CPA)method,where with a minimum of 70,000 traces partial private key coefficients can be recovered.Furthermore,we optimise the attack by extracting Point-of-Interests using known information due to parallelism(named CPA-PoI)and by iteratively utilising parallel leakages(named CPA-ITR).Our experimental results show that CPA-PoI reduces the number of traces by up to 16.67%,CPA-ITR by up to 25%,and both increase the number of recovered key coefficients by up to 55.17% and 93.10% using the same number of traces.They outperfom the CPA method.As a result,it suggests that the FPGA implementation of CRYSTALS-Dilithium is more vulnerable than thought before to side-channel analysis.展开更多
The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the ...The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces.展开更多
This paper discusses transmission performance and power allocation strategies in an underlay cognitive radio (CR) network that contains relay and massive multi-input multi-output (MIMO). The downlink transmission ...This paper discusses transmission performance and power allocation strategies in an underlay cognitive radio (CR) network that contains relay and massive multi-input multi-output (MIMO). The downlink transmission performance of a relay-aided massive MIMO network without CR is derived. By using the power distribution criteria, the kth user's asymptotic signal to interference and noise ratio (SINR) is independent of fast fading. When the ratio between the base station (BS) antennas and the relay antennas becomes large enough, the transmission performance of the whole system is independent of BS-to-relay channel parameters and relates only to the relay-to-users stage. Then cognitive transmission performances of primary users (PUs) and secondary users (SUs) in an underlay CR network with massive MIMO are derived under perfect and imperfect channel state information (CSI), including the end-to-end SINR and achievable sum rate. When the numbers of primary base station (PBS) antennas, secondary base station (SBS) antennas, and relay antennas become infinite, the asymptotic SINR of the kth PU and SU is independent of fast fading. The interference between the primary network and secondary network can be canceled asymptotically.Transmission performance does not include the interference temperature. The secondary network can use its peak power to transmit signals without causing any interference to the primary network. Interestingly, when the antenna ratio becomes large enough, the asymptotic sum rate equals half of the rate of a single-hop single-antenna K-user system without fast fading. Next, the PUs' utility function is defined. The optimal relay power is derived to maximize the utility function. The numerical results verify our analysis. The relationships between the transmission rate and the antenna nunber, relay power, and antenna ratio are simulated. We show that the massive MIMO with linear pre-coding can mitigate asymptotically the interference in a multi-user underlay CR network. The primary and secondary networks can operate independently.展开更多
In stepped wedge cluster randomised trials(SW-CRTs),clusters of subjects are randomly assigned to sequences,where they receive a specific order of treatments.Compared to conventional cluster randomised studies,one uni...In stepped wedge cluster randomised trials(SW-CRTs),clusters of subjects are randomly assigned to sequences,where they receive a specific order of treatments.Compared to conventional cluster randomised studies,one unique feature of SW-CRTs is that all clusters start from control and gradually transition to intervention according to the randomly assigned sequences.This feature mitigates the ethical concern of withholding an effective treatment and reduces the logistic burden of implementing the intervention at multiple clusters simultaneously.This feature,however,presents challenges that need to be addressed in experimental design and data analysis,i.e.,missing data due to prolonged follow-up and complicated correlation structures that involve between-subject and longitudinal correlations.In this study,based on the generalised estimating equation(GEE)approach,we present a closed-form sample size formula for SW-CRTs with a binary outcome,which offers great flexibility to account for unbalanced randomisation,missing data,and arbitrary correlation structures.We also present a correction approach to address the issue of under-estimated variance by GEE estimator when the sample size is small.Simulation studies and application to a real clinical trial are presented.展开更多
The energy consumption in the wireless sensor networks is a very critical issue which attracts immediate attention for the sake of the growing demand of the billion dollar market in future. The Dynamic Power Manageme...The energy consumption in the wireless sensor networks is a very critical issue which attracts immediate attention for the sake of the growing demand of the billion dollar market in future. The Dynamic Power Management (DPM) technique is a way of controlling and saving the energy usage in a sensor node. Previously, researchers have proposed lifetime improving stochastic models for wireless sensor networks and limited work has been done focusing on the wireless sensor node. This paper proposes an analyser based Semi-Markov model for DPM in the event-driven sensor node. The power consumption comparison with previously proposed models without this analyser shows the analyser significant contributes to lifetime improvement. The improved model is more power efficient, presents how the DPM model observes the input event arrival and power states of the sensor node components, and then dynamically manages the power consumption of the overall system. Further, to observe the effect of event arrival, missed events, waiting time, processor utilization on the power consumption and lifetime, the proposed DPM system with the single server queuing model is developed.展开更多
With the structure of two air gaps and two rotors, the electromagnetic continuously variable transmission(EMCVT) is a novel power-split continuously variable transmission(CVT). There are two kinds of power flowing...With the structure of two air gaps and two rotors, the electromagnetic continuously variable transmission(EMCVT) is a novel power-split continuously variable transmission(CVT). There are two kinds of power flowing through the EMCVT, one is mechanical power and the other is electric power. In the mean time, there are three power ports in the EMCVT, one is the outer rotor named mechanical power port and the other two are the inner rotor and the stator named electric power ports. The mechanical power port is connected to the driving wheels through the final gear and the electric ports are connected to the batteries through the transducers. The two kinds of power are coupled on the outer rotor of the EMCVT. The EMCVT can be equipped on the conventional vehicle being regarded as the CVT and it also can be equipped on the hybrid electric vehicle(HEV) as the multi-energy sources assembly. The power flows of these two kinds of applications are analysed. The back electromotive force(EMF) equations are illatively studied and so the dynamic mathematic model is theorized. In order to certify the feasibility of the above theories, three simulations are carried out in allusion to the above two kinds of mentioned applications of the EMCVT and a five speed automatic transmission(AT) vehicle. The simulation results illustrate that the efficiency of the EMCVT vehicles is higher than that of the AT vehicle owed to the optimized operation area of the engine. Hence the fuel consumption of the EMCVT vehicles is knock-down.展开更多
Magnetic radiation phenomena appear inevitably in the magnetic-resonance wireless power transfer (MR-WPT) system, and regarding this problem the magnetic-shielding scheme is applied to improve the electromagnetic pe...Magnetic radiation phenomena appear inevitably in the magnetic-resonance wireless power transfer (MR-WPT) system, and regarding this problem the magnetic-shielding scheme is applied to improve the electromagnetic performance in engineering. In this study, the shielding effectiveness of a two-coil MR-WPT system for different material shields is analyzed in theory using Moser's formula and Schelkunoff's formula. On this basis a candidate magnetic-shielding scheme with a double-layer structure is determined, which has better shielding effectiveness and coils coupling coefficient. Finally, some finite element simulation results validate the correctness of the theoretical analysis, and the shielding effectiveness with the double-layer shield in maximum is 30?dB larger than the one with the single-layer case.展开更多
Properties of the active power/angle sub-matrix in the power flow Jacobian for power system analysis are studied. The sub-matrix is a dominant and irreducible matrix under very general conditions of power systems, so ...Properties of the active power/angle sub-matrix in the power flow Jacobian for power system analysis are studied. The sub-matrix is a dominant and irreducible matrix under very general conditions of power systems, so that it is invertible. Also the necessary conditions for its singularity are given. These theoretical results can be used to clarify the ambiguous understanding of the sub-matrix in current literature, and also provide the theoretical foundations for the applications based on reduced power flow Jaeobian. Numerical simulation on the IEEE 118-bus power system is used to illustrate our results.展开更多
Power supply and demand inJanuary-September, 2007Since 2007, the national economy developed continu-ously, showing a situation of rapid growth, more optimizedstructure, increased efficiency and improvement of people...Power supply and demand inJanuary-September, 2007Since 2007, the national economy developed continu-ously, showing a situation of rapid growth, more optimizedstructure, increased efficiency and improvement of people'slivelihood. In the first three quarters, GDP achieved 16.6043trillion Yuan, and its year-on-year growth rate was 11.5%;展开更多
In recent years, with the expansion of the urban area and the increase of the urban population, the urban traffic problem is gradually prominent. China's transportation system is mature and the technical means are...In recent years, with the expansion of the urban area and the increase of the urban population, the urban traffic problem is gradually prominent. China's transportation system is mature and the technical means are high, but the problems also increase. The improvement of China's scientific and technological level has provided a stronger support for the transportation system of China, which has a vast territory and abundant resources. As a new mode of transportation, urban rail transit has many advantages, such as high speed, low pollution, relieving urban traffic congestion and so on. It is the main direction of urban transportation development in China in the future. In order to give full play to the use of power technology skills, our scientific and technical personnel have to continue to innovate equipment and artificial technical means, attention and attention to traction power supply system and other very important core technology, continuous optimization and improvement.展开更多
文摘Average power analysis plays a crucial role in the design of large-scale digital integrated circuits(ICs).The integration of data-driven machine learning(ML)methods into the electronic design automation(EDA)fields has increased the demand for extensive datasets.To address this need,we propose a novel pseudo-circuit generation algorithm rooted in graph topology.This algorithm efficiently produces a multitude of power analysis examples by converting randomly generated directed acyclic graphs(DAGs)into gate-level Verilog pseudo-combinational circuit netlists.The subsequent introduction of register units transforms pseudo-combinational netlists into pseudo-sequential circuit netlists.Hyperparameters facilitate the control of circuit topology,while appropriate sequential constraints are applied during synthesis to yield a pseudo-circuit dataset.We evaluate our approach using the mainstream power analysis software,conducting pre-layout average power tests on the generated circuits,comparing their performance against benchmark datasets,and verifying the results through circuit topology complexity analysis and static timing analysis(STA).The results confirm the effectiveness of the dataset,and demonstrate the operational efficiency and robustness of the algorithm,underscoring its research value.
基金the Software and Integrated CircuitIndustries Development Foundation of Shanghai(No.12Z116010001)
文摘Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor.
基金supported by the Hunan Provincial Natrual Science Foundation of China(2022JJ30103)“the 14th Five-Year”Key Disciplines and Application Oriented Special Disciplines of Hunan Province(Xiangjiaotong[2022],351)the Science and Technology Innovation Program of Hunan Province(2016TP1020).
文摘Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key degeneration and slow evolution within populations.These challenges significantly hinder key recovery efforts.This paper proposes a screening correlation power analysis framework combined with a genetic algorithm,named SFGA-CPA,to address these issues.SFGA-CPA introduces three operations designed to exploit CPA characteris-tics:propagative operation,constrained crossover,and constrained mutation.Firstly,the propagative operation accelerates population evolution by maximizing the number of correct bytes in each individual.Secondly,the constrained crossover and mutation operations effectively address key degeneration by preventing the compromise of correct bytes.Finally,an intelligent search method is proposed to identify optimal parameters,further improving attack efficiency.Experiments were conducted on both simulated environments and real power traces collected from the SAKURA-G platform.In the case of simulation,SFGA-CPA reduces the number of traces by 27.3%and 60%compared to CPA based on multiple screening methods(MS-CPA)and CPA based on simple GA method(SGA-CPA)when the success rate reaches 90%.Moreover,real experimental results on the SAKURA-G platform demonstrate that our approach outperforms other methods.
文摘Differential Power Analysis (DPA) is an effective attack method to break the crypto chips and it has been considered to be a threat to security of information system. With analyzing the prin-ciple of resisting DPA,an available countermeasure based on randomization is proposed in this paper. Time delay is inserted in the operation process and random number is precharged to the circuit during the delay time,the normal schedule is disturbed and the power is randomized. Following this meth-odology,a general DPA resistance random precharge architecture is proposed and DES algorithm following this architecture is implemented. This countermeasure is testified to be efficient to resist DPA.
基金supported by Major State Basic Research Development Program(No. 2013CB338004)National Natural Science Foundation of China(No.61402286, 61202372,61202371,61309021)National Science and Technology Major Project of the Ministry of Science and Technology of China (No.2014ZX01032401-001)
文摘Power analysis is a non-invaslve attack against cryptographic hardware, which effectively exploits runtime power consumption characteristics of circuits. This paper proposes a new power model which combines Hamming Distance model and the model based on the template value of power consumption in combinational logic circuit. The new model can describe the power consumption characteristics of sequential logic circuits and those of combinational logic as well. The new model can be used to improve the existing power analysis methods and detect the information leakage of power consumption. Experimental results show that, compared to CPA(Correlation Power Analysis) method, our proposed attack which adopt the combinational model is more efficient in terms of the number of required power traces.
文摘The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the information by observing the power consumption,electromagnetic(EM)field,timing analysis,and acoustics of the device.Later,the attackers perform statistical functions to recover the key.Advanced Encryption Standard(AES)algorithm has proved to be a good security solution for constrained IoT devices.This paper implements a simulation model which is used to modify theAES algorithm using logicalmasking properties.This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES.This model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB simulator.Results will give better solution by hiding power profiles of the IoT devices against PAAs.In future,the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic(WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array(FPGA).
文摘Stream ciphers based on linear feedback shift register(LFSR)are suitable for constrained environments,such as satellite communications,radio frequency identification devices tag,sensor networks and Internet of Things,due to its simple hardware structures,high speed encryption and lower power consumption.LFSR,as a cryptographic primitive,has been used to generate a maximum period sequence.Because the switching of the status bits is regular,the power consumption of the LFSR is correlated in a linear way.As a result,the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks.In this paper,a new design of LFSR against power attacks is proposed.The power consumption characteristics of LFSR can be masked by using an additional LFSR and confused by adding a new filter Boolean function and a flip-flop.The design method has been implemented easily by circuits in this new design in comparison with the others.
基金the National High Technology Research and Development Programme of China(No.2006AA01Z226)
文摘Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.The masking strategies in algorithm level view each S-Box as an independent moduleand mask them respectively,which are costly in size and power for non-linear characteristic of S-Boxes.The new method uses dynamic inhomogeneous S-Boxes instead of traditional homogeneous S-Boxes,andarranges the S-Boxes randomly.So the power and data path delay of substitution unit become unpre-dictable.The experimental results demonstrate that this scheme takes advantages of the circuit character-istics of various S-Box implementations to eliminate the correlation between crypto operation and power.Itneeds less extra circuits and suits resource constrained applications.
基金supported in part by National Key R&D Program of China(No.2022YFB3103800)National Natural Science Foundation of China(No.U1936209,No.62202231 and No.62202230)+4 种基金the Defense Industrial Technology Development Program(No.JCKY2021606B013)China Postdoctoral Science Foundation(No.2021M701726)Jiangsu Funding Program for Excellent Postdoctoral Talent(No.2022ZB270)Yunnan Provincial Major Science and Technology Special Plan Projects(No.202103AA080015)CCF-Tencent Rhino-Bird Open Research Fund(No.CCF-Tencent RAGR20230114).
文摘During the standardisation process of post-quantum cryptography,NIST encourages research on side-channel analysis for candidate schemes.As the recommended lattice signature scheme,CRYSTALS-Dilithium,when implemented on hardware,has seen limited research on side-channel analysis,and current attacks are incomplete or requires a substantial quantity of traces.Therefore,we conducted a more complete analysis to investigate the leakage of an FPGA implementation of CRYSTALS-Dilithium using the Correlation Power Analysis(CPA)method,where with a minimum of 70,000 traces partial private key coefficients can be recovered.Furthermore,we optimise the attack by extracting Point-of-Interests using known information due to parallelism(named CPA-PoI)and by iteratively utilising parallel leakages(named CPA-ITR).Our experimental results show that CPA-PoI reduces the number of traces by up to 16.67%,CPA-ITR by up to 25%,and both increase the number of recovered key coefficients by up to 55.17% and 93.10% using the same number of traces.They outperfom the CPA method.As a result,it suggests that the FPGA implementation of CRYSTALS-Dilithium is more vulnerable than thought before to side-channel analysis.
基金supported by the Major Program“Core of Electronic DevicesHigh-End General Chips+1 种基金and Basis of Software Products”of the Ministry of Industry and Information Technology of China(No.2014ZX01032205)the Key Technologies Research and Development Program of the Twelfth Five-Year Plan of China(No.MMJJ201401009)
文摘The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces.
基金Project supported by the National Natural Science Foundation of China(Nos.61227801 and 61629101)the Huawei Communications Technology Lab,the Open Research Foundation of Xi’an Jiaotong University(No.sklms2015015)the China Scholarship Council(CSC)
文摘This paper discusses transmission performance and power allocation strategies in an underlay cognitive radio (CR) network that contains relay and massive multi-input multi-output (MIMO). The downlink transmission performance of a relay-aided massive MIMO network without CR is derived. By using the power distribution criteria, the kth user's asymptotic signal to interference and noise ratio (SINR) is independent of fast fading. When the ratio between the base station (BS) antennas and the relay antennas becomes large enough, the transmission performance of the whole system is independent of BS-to-relay channel parameters and relates only to the relay-to-users stage. Then cognitive transmission performances of primary users (PUs) and secondary users (SUs) in an underlay CR network with massive MIMO are derived under perfect and imperfect channel state information (CSI), including the end-to-end SINR and achievable sum rate. When the numbers of primary base station (PBS) antennas, secondary base station (SBS) antennas, and relay antennas become infinite, the asymptotic SINR of the kth PU and SU is independent of fast fading. The interference between the primary network and secondary network can be canceled asymptotically.Transmission performance does not include the interference temperature. The secondary network can use its peak power to transmit signals without causing any interference to the primary network. Interestingly, when the antenna ratio becomes large enough, the asymptotic sum rate equals half of the rate of a single-hop single-antenna K-user system without fast fading. Next, the PUs' utility function is defined. The optimal relay power is derived to maximize the utility function. The numerical results verify our analysis. The relationships between the transmission rate and the antenna nunber, relay power, and antenna ratio are simulated. We show that the massive MIMO with linear pre-coding can mitigate asymptotically the interference in a multi-user underlay CR network. The primary and secondary networks can operate independently.
基金supported by the Patient-Centered Outcomes Research Institute[ME-1609-36761].
文摘In stepped wedge cluster randomised trials(SW-CRTs),clusters of subjects are randomly assigned to sequences,where they receive a specific order of treatments.Compared to conventional cluster randomised studies,one unique feature of SW-CRTs is that all clusters start from control and gradually transition to intervention according to the randomly assigned sequences.This feature mitigates the ethical concern of withholding an effective treatment and reduces the logistic burden of implementing the intervention at multiple clusters simultaneously.This feature,however,presents challenges that need to be addressed in experimental design and data analysis,i.e.,missing data due to prolonged follow-up and complicated correlation structures that involve between-subject and longitudinal correlations.In this study,based on the generalised estimating equation(GEE)approach,we present a closed-form sample size formula for SW-CRTs with a binary outcome,which offers great flexibility to account for unbalanced randomisation,missing data,and arbitrary correlation structures.We also present a correction approach to address the issue of under-estimated variance by GEE estimator when the sample size is small.Simulation studies and application to a real clinical trial are presented.
文摘The energy consumption in the wireless sensor networks is a very critical issue which attracts immediate attention for the sake of the growing demand of the billion dollar market in future. The Dynamic Power Management (DPM) technique is a way of controlling and saving the energy usage in a sensor node. Previously, researchers have proposed lifetime improving stochastic models for wireless sensor networks and limited work has been done focusing on the wireless sensor node. This paper proposes an analyser based Semi-Markov model for DPM in the event-driven sensor node. The power consumption comparison with previously proposed models without this analyser shows the analyser significant contributes to lifetime improvement. The improved model is more power efficient, presents how the DPM model observes the input event arrival and power states of the sensor node components, and then dynamically manages the power consumption of the overall system. Further, to observe the effect of event arrival, missed events, waiting time, processor utilization on the power consumption and lifetime, the proposed DPM system with the single server queuing model is developed.
基金supported by National Natural Science Foundation of China(No.50605020)Guangdong Provincial Science and Technology Project of China(No.2006A10501001).
文摘With the structure of two air gaps and two rotors, the electromagnetic continuously variable transmission(EMCVT) is a novel power-split continuously variable transmission(CVT). There are two kinds of power flowing through the EMCVT, one is mechanical power and the other is electric power. In the mean time, there are three power ports in the EMCVT, one is the outer rotor named mechanical power port and the other two are the inner rotor and the stator named electric power ports. The mechanical power port is connected to the driving wheels through the final gear and the electric ports are connected to the batteries through the transducers. The two kinds of power are coupled on the outer rotor of the EMCVT. The EMCVT can be equipped on the conventional vehicle being regarded as the CVT and it also can be equipped on the hybrid electric vehicle(HEV) as the multi-energy sources assembly. The power flows of these two kinds of applications are analysed. The back electromotive force(EMF) equations are illatively studied and so the dynamic mathematic model is theorized. In order to certify the feasibility of the above theories, three simulations are carried out in allusion to the above two kinds of mentioned applications of the EMCVT and a five speed automatic transmission(AT) vehicle. The simulation results illustrate that the efficiency of the EMCVT vehicles is higher than that of the AT vehicle owed to the optimized operation area of the engine. Hence the fuel consumption of the EMCVT vehicles is knock-down.
基金Supported by the National Natural Science Foundation of China under Grant No 51377185
文摘Magnetic radiation phenomena appear inevitably in the magnetic-resonance wireless power transfer (MR-WPT) system, and regarding this problem the magnetic-shielding scheme is applied to improve the electromagnetic performance in engineering. In this study, the shielding effectiveness of a two-coil MR-WPT system for different material shields is analyzed in theory using Moser's formula and Schelkunoff's formula. On this basis a candidate magnetic-shielding scheme with a double-layer structure is determined, which has better shielding effectiveness and coils coupling coefficient. Finally, some finite element simulation results validate the correctness of the theoretical analysis, and the shielding effectiveness with the double-layer shield in maximum is 30?dB larger than the one with the single-layer case.
基金the National Natural Science Foundation of China (No. 50307007)
文摘Properties of the active power/angle sub-matrix in the power flow Jacobian for power system analysis are studied. The sub-matrix is a dominant and irreducible matrix under very general conditions of power systems, so that it is invertible. Also the necessary conditions for its singularity are given. These theoretical results can be used to clarify the ambiguous understanding of the sub-matrix in current literature, and also provide the theoretical foundations for the applications based on reduced power flow Jaeobian. Numerical simulation on the IEEE 118-bus power system is used to illustrate our results.
文摘Power supply and demand inJanuary-September, 2007Since 2007, the national economy developed continu-ously, showing a situation of rapid growth, more optimizedstructure, increased efficiency and improvement of people'slivelihood. In the first three quarters, GDP achieved 16.6043trillion Yuan, and its year-on-year growth rate was 11.5%;
文摘In recent years, with the expansion of the urban area and the increase of the urban population, the urban traffic problem is gradually prominent. China's transportation system is mature and the technical means are high, but the problems also increase. The improvement of China's scientific and technological level has provided a stronger support for the transportation system of China, which has a vast territory and abundant resources. As a new mode of transportation, urban rail transit has many advantages, such as high speed, low pollution, relieving urban traffic congestion and so on. It is the main direction of urban transportation development in China in the future. In order to give full play to the use of power technology skills, our scientific and technical personnel have to continue to innovate equipment and artificial technical means, attention and attention to traction power supply system and other very important core technology, continuous optimization and improvement.