This study investigates an option pricing method called g-pricing based on backward stochastic differential equations combined with deep learning.We adopted a datadriven approach to find a market-appropriate generator...This study investigates an option pricing method called g-pricing based on backward stochastic differential equations combined with deep learning.We adopted a datadriven approach to find a market-appropriate generator of the backward stochastic differential equation,which is achieved by leveraging the universal approximation capabilities of neural networks.Option pricing,which is the solution to the equation,is approximated using a recursive procedure.The empirical results for the S&P 500 index options show that the proposed deep learning g-pricing model has lower absolute errors than the classical Black–Scholes–Merton model for the same forward stochastic differential equations.The g-pricing mechanism has potential applications in option pricing.展开更多
This study investigates adaptive equilibrium strategies for multiple risk-averse informed traders in Almgren–Chriss framework.Dynamic information and transaction costs are taken into account.Using a convex analytic a...This study investigates adaptive equilibrium strategies for multiple risk-averse informed traders in Almgren–Chriss framework.Dynamic information and transaction costs are taken into account.Using a convex analytic approach,we characterize the openloop Nash equilibrium in terms of a system of linear forward-backward stochastic differential equations,and further provide an explicit feedback expression of the unique equilibrium.The results show how risk-averse informed traders exploit long-lived information and manage positions in the face of information volatility and inaccuracy.展开更多
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec...Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure.展开更多
基金supported by Taishan Scholar Project of Shandong Province of China(Grant tstp20240803)the National Key R&D Program of China(Grant No.2023YFA1008903)the Major Fundamental Research Project of Shandong Province of China(Grant No.ZR2023ZD33).
文摘This study investigates an option pricing method called g-pricing based on backward stochastic differential equations combined with deep learning.We adopted a datadriven approach to find a market-appropriate generator of the backward stochastic differential equation,which is achieved by leveraging the universal approximation capabilities of neural networks.Option pricing,which is the solution to the equation,is approximated using a recursive procedure.The empirical results for the S&P 500 index options show that the proposed deep learning g-pricing model has lower absolute errors than the classical Black–Scholes–Merton model for the same forward stochastic differential equations.The g-pricing mechanism has potential applications in option pricing.
基金support from Taishan Scholar Project of Shandong Province of China(Grant tstp20240803)the National Key R&D Program of China(Grant No.2023YFA1008903)+1 种基金the Major Fundamental Research Project of Shandong Province of China(Grant No.ZR2023ZD33)the Natural Science Foundation of Shandong Province(Grant No.ZR2023LLZ012).
文摘This study investigates adaptive equilibrium strategies for multiple risk-averse informed traders in Almgren–Chriss framework.Dynamic information and transaction costs are taken into account.Using a convex analytic approach,we characterize the openloop Nash equilibrium in terms of a system of linear forward-backward stochastic differential equations,and further provide an explicit feedback expression of the unique equilibrium.The results show how risk-averse informed traders exploit long-lived information and manage positions in the face of information volatility and inaccuracy.
基金Project supported by the Major Program of the Ministry of Industry and Information Technology of China(No.2017ZX01030301)the Beijing Natural Science Foundation of China(No.4162053)
文摘Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure.