期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
点钞机噪声源的识别 被引量:2
1
作者 李光 王开和 +1 位作者 卢学军 许玮 《天津科技大学学报》 CAS 2004年第2期44-47,共4页
从点钞机的结构入手,采用分部运行、功率谱分析、相干分析和模态分析相结合的方法,分析了机器的振动和噪声信号,找出了主要噪声源和振动源及其主要频率成分。对点钞机进行了改造,使点钞机标准点噪声从63dB降到58dB。
关键词 点钞机 频谱分析 相于分析 模态分析 减振降噪
在线阅读 下载PDF
Defeating constraint based program analysis with temporal correlation function
2
作者 安靖 Fan Wenqing Yang Yixian 《High Technology Letters》 EI CAS 2013年第3期332-337,共6页
Constraint based program analysis is widely used in program validation, program vulnerability analysis, etc. This paper proposes a temporal correlation function to protect programs from analysis. The temporal correlat... Constraint based program analysis is widely used in program validation, program vulnerability analysis, etc. This paper proposes a temporal correlation function to protect programs from analysis. The temporal correlation function can be applied to resist against both static and dynamic function summary and eoncolie testing. What' s more, the temporal correlation function can produce different outputs even with same input. This feature can be used to damage the premise of function summary as well as prevent concolie testing process to run the new branch with new input. Experiment results show that this method can reduce efficiency and path coverage of concolic testing, while greatly in- creasing the difficulty of constraint based program analysis. 展开更多
关键词 program analysis symbolic execution satisfiability problem constraint solving
在线阅读 下载PDF
Correlation power attack on a message authentication code based on SM3
3
作者 Ye YUAN Kai-ge QU +2 位作者 Li-jiWU Jia-weiMA Xiang-min ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期930-946,共17页
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec... Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure. 展开更多
关键词 HMAC-SM3 Side channel analysis Correlation power attack Bit-wise chosen-plaintext
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部