期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Option pricing mechanisms driven by backward stochastic differential equations
1
作者 Yufeng Shi Bin Teng Sicong Wang 《Financial Innovation》 2025年第1期2965-2983,共19页
This study investigates an option pricing method called g-pricing based on backward stochastic differential equations combined with deep learning.We adopted a datadriven approach to find a market-appropriate generator... This study investigates an option pricing method called g-pricing based on backward stochastic differential equations combined with deep learning.We adopted a datadriven approach to find a market-appropriate generator of the backward stochastic differential equation,which is achieved by leveraging the universal approximation capabilities of neural networks.Option pricing,which is the solution to the equation,is approximated using a recursive procedure.The empirical results for the S&P 500 index options show that the proposed deep learning g-pricing model has lower absolute errors than the classical Black–Scholes–Merton model for the same forward stochastic differential equations.The g-pricing mechanism has potential applications in option pricing. 展开更多
关键词 Option pricing Backward stochastic differential equation Numerical method Deep learning
在线阅读 下载PDF
Correlation power attack on a message authentication code based on SM3
2
作者 Ye YUAN Kai-ge QU +2 位作者 Li-jiWU Jia-weiMA Xiang-min ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期930-946,共17页
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec... Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure. 展开更多
关键词 HMAC-SM3 Side channel analysis Correlation power attack Bit-wise chosen-plaintext
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部