The Improved Montgomery Scalar Multiplication Algorithm with DPA Resistance Yanqi Xu, Lin Chen, Moran Li
|
|
- Emory Robbins
- 5 years ago
- Views:
Transcription
1 nd Internatonal Conference on Electrcal, Computer Engneerng and Electroncs (ICECEE 015) The Improved Montgomery Scalar Multplcaton Algorthm wth DPA Resstance Yanq Xu, Ln Chen, Moran L Informaton Scence and Technology Insttute, Zhengzhou, 45000, Chna e-mal: xyq_1@163com Keywords: ECC, DPA, Montgomery scalar multplcaton algorthm, securty system Abstract Wth Montgomery scalar multplcaton algorthm beng wdely used n ellptc curve cryptography systems, the researches on DPA attacks aganst Montgomery scalar multplcaton algorthm become more extensve, but few researches are about the DPA resstance algorthm Ths paper analyzed the DPA resstance capablty of the Montgomery scalar multplcaton algorthm frstly, and on ths bass, proposed an mproved algorthm wth random Z coordnate to resst the DPA attacks wth the characterstcs that the parameter Z only partcpates n the ntermedate operatons wthout affectng the fnal results Ths paper descrbed the orgnal algorthm and the mproved algorthm usng Verlog HDL targetng on the 65 nm standard cell lbrary Results show that the mproved Montgomery Scalar Multplcaton algorthm can dramatcally mprove the ant-dpa attack property wth only 036% performance and area 960% area penalty Introducton Ellptc Curve Cryptography (ECC)[1] s superor to other publc key cryptographes such as RSA n hgh bt strength, excellent calculaton speed, and small storage space Encrypton, decrypton, sgnng, verfcaton and other algorthms are all based on the scalar multplcaton of ponts on the ellptc curve[], so the calculaton speed and the ablty of attack resstance of the scalar multplcaton wll determne the calculaton capablty and safety of the whole curve cryptosystem The technology of Sde Channel Attacks posed a huge threat to the crypto chp because of ts smple attack equpment and measure Power Analyss Attacks[3] s a common technology of Sde Channel Attacks, ncludng Smple Power Analyss (SPA) and Dfferental Power Analyss (DPA) The desgn and mplementaton of scalar multplcaton algorthm should also consder to the threat of SPA and the DPA attacks to mprove the securty of the algorthm Reference[4] proved that Montgomery Ladder Scalar Multplcaton Algorthm can t resst the DPA attacks Reference [5] gave a way to resst the DPA by ntroducng random redundant operaton for decreasng S/N, but ths method largely ncreased the crcut area and power consumpton Ths paper proposed an mproved algorthm of random Z coordnate to resst the DPA attacks combnng the random thought wth the Montgomery Scalar Multplcaton Algorthm, and smulated the DPA resstance capablty of the mproved algorthm The Securty Analyss of the Montgomery Scalar Multplcaton Algorthm The Montgomery scalar multplcaton algorthm[6] s wdely used n engneerng feld because of ts hgh calculaton speed and small storage space Ths scalar multplcaton algorthm s descrbed based on projecton coordnate The algorthm s showed n Algorthm The authors - Publshed by Atlants Press 533
2 Algorthm 1: Montgomery Scalar Multplcaton Input: k = ( kt 1,, k1, k0), k t-1 =1, P= ( xy, ) E( m ) Output: kp 4 1 X1 xz, 1 1, X x + bz, x { ( P, P )} For from t to 0, do 1 If k = 1,then T Z, Z ( X Z + X Z ), X xz + X X TZ ,, T X X X + bz Z T Z else T Z, Z ( X Z + X Z ), X xz + X X TZ T X1, X1 X1 + bz1, Z1 T Z 1 3 x3 X1 / Z1 4 y = ( x + X / Z )[( X + xz )( X + xz ) ( x + y)( ZZ )]( xzz ) + y 5 Return ( x3, y 3) The SPA and the tme attack requre that the key has an extraordnary nfluence on power consumpton The attacker needs to grasp the exhaustve mplementaton detals and then surmse the relatve key nformaton related to operaton[7], accordng to the metrc power consumpton track and the analyss of one moment s arthmetc operatons of encrypton devces along the tme axs Through the Montgomery scalar multplcaton algorthm s second step we can fnd, ether k = 1or k = 0, the algorthm wll execute the same calculaton so we can t surmse the key by drectly analyzng the power consumpton track So ths algorthm can resst the SPA and the tme attack The DPA can utlze the data dependence by large amount of energy track to analyze the devce s power consumpton of the fxed tme Then the attacker obtans the nvarants of the calculaton process(such as key s nformaton)[7] So as to analyss convenently, we use ths form whch s equal to the second step of Algorthm 1 as follows: If k = 1, then P1 P1+ P, P P If k = 0, then P P1+ P, P1 P1 Because kt-1 = 1, P1 = P, P = P, the next, when kt- = 0, P1 = P, P = 3P; when kt- = 1, P1 = 3P, P = 4P Thus we can see that the dfferent value of kt- can generate dfferent mddle consequence, and dfferent mddle consequence wll generate dfferent power consumpton whch can be utlzed by DPA Document [4] smulated the DPA attacks aganst Montgomery scalar multplcaton algorthm n the envronment of EDA and proved that ths algorthm can t resst the DPA attacks The Improved Algorthm of Montgomery Scalar Multplcaton Wth DPA Resstance Montgomery scalar multplcaton algorthm can be realzed by projecton coordnates--turn nverson to multplcaton to mprove the effcency of the algorthm The result of operaton s unrelated to the value of Z Combnng wth ths character, ths artcle added a random number generator n the algorthm s hardware mplementaton, and the generator can generate a random Z before every dot product, thus the ntermedate result ntroduces a random ngredent because of Z Power consumpton s related to data and n ths algorthm even we perform twce dentcal nput operatons the power consumpton won t be the same, so t can resst the DPA attacks The mproved algorthm of random Z coordnate s as follows: 534
3 Algorthm :The Improved Montgomery Scalar Multplcaton Input: k = ( kt 1,, k1, k0), k t-1 =1, P= ( xy, ) E( m ) k<n Output: kp X1 xz1, Z1 random, X X1 + bz1, Z X1Z1 For from t to 0, do 1 If k = 1,then T Z, Z ( X Z + X Z ), X xz + X X TZ ,, T X X X + bz Z T Z else T Z, Z ( X Z + X Z ), X xz + X X TZ T X1, X1 X1 + bz1, Z1 T Z 1 3 x3 X1 / Z1 4 y = ( x + X / Z )[( X + xz )( X + xz ) ( x + y)( ZZ 1 )]( xzz 1 ) + y 5 Return ( x3, y 3) We used hardware to realze Algorthm n the doman of GF(19), and adapt the mproved algorthm of Montgomery FIOS whch s sutable for hardware to realze the core multplcaton unt We adapt sngle port wrtng and dual port readng regster fle to nject parameter and dspatch the data convenently In order not to affect the operatonal effcency, the random generator and the arthmetc unt perform n parallel and store the random number for the next round operaton The hardware archtecture of random Z coordnate mproved algorthm s as follows: Key Reg Man Control Unt Random Number Generator F S M Wrtng Control Unt Regster Fle T y x Z X Z1 X1 Readng Readng Control Control Unt 1 Unt Modular Multplcaton Unt Modular Inverse Unt Modular Add Unt Modular Arthmetc Control Unt Fg 1 The hardware of random Z coordnate mproved algorthm Ths paper compled the hardware module n the 018um technology by DC and compared wth Algorthm One The result s as follows: Table I The Area and Effcency s Comparson Between Algorthm 1 and Algorthm Algorthm 1 Algorthm Comparson Gates Increased by 960% Clock Cycle Increased by 036% Algorthm adds the random number generator, so the area s ncreased by 960% Because the random number generatng and the mathematcal unt don t affect the effcency, the algorthm only adds twce modulus square operatons and three tmes modulus multplcaton, the effcency of the algorthm s only decreased by 036% Test the DPA Resstance Capablty of the Improved Algorthm To test the DPA resstance ablty of the mproved algorthm, ths paper attacked the mproved algorthm by DPA attacks n the envronment of EDA Processes are as follows: 1 Buld power analyss smulaton system Frst, we descrbed the 19-bt length algorthm wth Verlog HDL, and wrote the testbench, then ntegrated the hardware descrpton fle n the envronment of DC tool to generate gate-level netlst fle, and then changed the gate-level netlst fle 535
4 and testbench nto vcd fle through NC smulaton At last, we analyzed the power consumpton of the vcd fle wth PrmePower and recorded the result Collect the data Based on the Power Consumpton Data Acquston System n Step 1, we used fxed key to encrypt the 1000 random ponts P, P,, P separately and recorded the 1000 groups power consumpton data S0[ j], S1[ j],, S999[ j] ( j s the sample ponts) 3 Generate dscernblty functon Known k = 1 191, we could speculate k = 1 190, and other bts are any k g = (1,1,x,,x,x) kg value that the speculated key s Then we used Modelsm to calculate the and the 1000 random ponts P to get a group of dscernblty functon values D, D,, D Deal wth the data We used D to dvde the power consumpton curve n Step nto two groups accordng to these standards: S0 = { S[ j] D=0} S1 = { S[ j] D=1} Then we calculated every sample pont s average value of two group s power consumpton curve and subtract [ j] = E( S ) E( S ) = S [ j] S[ j] S 1 S S S 1 0 S S0 We can repeat these steps and get the power consumpton s dfference curves of the orgnal Montgomery scalar multplcaton algorthm and the mproved algorthm As shown n Fgure and Fgure 3 (a) The dfference curve of power consumpton when guessng the key rght (b) The dfference curve of power consumpton when guessng the key wrong Fgure The result of DPA s attack to Montgomery scalar multplcaton algorthm 536
5 (a) The dfference curve of power consumpton when guessng the key rght (b) The dfference curve of power consumpton when guessng the key wrong Fgure 3 The DPA attack to the mproved algorthm basng on random Z coordnate Comparng the fgure (a) and fgure (b) we can see that there are apparent peaks when the speculated key s rght and there sn t any peak when the speculated key s wrong, so we can conclude that the Montgomery scalar multplcaton algorthm can t resst DPA attacks and we can attack the algorthm one bt by one bt for rght key accordng to the above steps From the Fgure 3 we can see there won t be any peak when the speculated key s rght or wrong and we can conclude that the random Z coordnate can change the related features of the key and the power consumpton so as to dsable statstcal means and resst the DPA attacks n the end Concluson Ths paper analyzed the safety of the Montgomery scalar multplcaton algorthm, proposed an mproved algorthm basng on random Z coordnate Its ablty of DPA resstance s verfed by EDA smulaton tools Results show that the mproved Montgomery Scalar Multplcaton algorthm can dramatcally mprove the ant-dpa attack property Otherwse, many scalar multplcaton algorthms adopt standard projecton coordnate, Jacob projecton coordnates and Lopez-Dahab projecton coordnates to mprove the effcency Because all these projecton coordnates use the parameter Z only partcpates n the ntermedate operatons wthout affectng the fnal results, we can transplant the random Z coordnate nto other algorthms basng on projecton coordnate Consequently, the mproved algorthm has mportant practcal value 537
6 References [1] Kobltz N Ellptc curve crytosystems[j] Mathematcs of Computaton, vol48, pp 03-09,1987 [] Chung S C, Lee J W, Chang H C, et al A hgh-performance ellptc curve cryptographc processor over GF (p) wth SPA resstance [C]//Crcuts and Systems (ISCAS), 01 IEEE Internatonal Symposum on IEEE,pp ,01 [3] Kocherp, Jaffe J, Jun B Dfferental Power Analyss[C] Proceedngs of Advances n CRYPTO 99, LNCS 1666 Sprnger-Verlag, Berln Hedelberg, pp , 1999 [4] Deng Qu Cheng, Ba Xue Fe, Guo L Research on Dfferental Power Analyss Attack on ECC Algorthm[J] Mcroelectoncs & Computer, vol,8(),pp 3-5, 011 [5] Dan Yong Png Chp Implementaton and t s Securty Defence for Ellptc Curve Cryptosystems over GF(m)[D] Wuhan: Huazhong Unversty of Scence and Technology, 008 [6] Darrel Hankerson, Alfred Menezes, Scott Vanstone Gude To Ellptc Curve Cryptography[M] Zhang Huan Guo, transl Bejng: Publshng House of Electroncs Industry, 005 [7] Stefan Mangard, Elsabeth Oswald, Thomas Popp Power Analyss Attacks Feng Deng Guo, Zhou Yong Bn, Lu J Ye, transl Bejng:Scence Press,
Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationBit-Parallel Word-Serial Multiplier in GF(2 233 ) and Its VLSI Implementation. Dr. M. Ahmadi
Bt-Parallel Word-Seral Multpler n GF(2 233 ) and Its VLSI Implementaton Supervsors: Student: Dr. Huapeng Wu Dr. M. Ahmad Wenka Tang Contents Introducton to Fnte Feld Research Motvatons Proposed Multplers
More informationCryptanalysis of pairing-free certificateless authenticated key agreement protocol
Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen
More informationParameter Estimation for Dynamic System using Unscented Kalman filter
Parameter Estmaton for Dynamc System usng Unscented Kalman flter Jhoon Seung 1,a, Amr Atya F. 2,b, Alexander G.Parlos 3,c, and Klto Chong 1,4,d* 1 Dvson of Electroncs Engneerng, Chonbuk Natonal Unversty,
More informationRSA /2002/13(08) , ); , ) RSA RSA : RSA RSA [2] , [1,4]
1000-9825/2002/13(081729-06 2002 Journal of Software Vol13, No8 RSA 1,2 1, 1 (, 200433; 2 (, 200070 E-mal: yfhu@fudaneducn http://wwwfudaneducn : RSA RSA :, ; RSA,,, RSA,, : ; RSA ; ;RSA; : TP309 : A RSA
More informationThe Study of Teaching-learning-based Optimization Algorithm
Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute
More informationComments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards
Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com
More informationInternational Power, Electronics and Materials Engineering Conference (IPEMEC 2015)
Internatonal Power, Electroncs and Materals Engneerng Conference (IPEMEC 2015) Dynamc Model of Wnd Speed Dstrbuton n Wnd Farm Consderng the Impact of Wnd Drecton and Interference Effects Zhe Dong 1, a,
More informationA Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
(IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More informationA Novel, Low-Power Array Multiplier Architecture
A Noel, Low-Power Array Multpler Archtecture by Ronak Bajaj, Saransh Chhabra, Sreehar Veeramachanen, MB Srnas n 9th Internatonal Symposum on Communcaton and Informaton Technology 29 (ISCIT 29) Songdo -
More informationPERFORMANCE OF HEAVY-DUTY PLANETARY GEARS
THE INTERNATIONAL CONFERENCE OF THE CARPATHIAN EURO-REGION SPECIALISTS IN INDUSTRIAL SYSTEMS 6 th edton PERFORMANCE OF HEAVY-DUTY PLANETARY GEARS Attla Csobán, Mhály Kozma 1, 1 Professor PhD., Eng. Budapest
More informationA New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic
Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationDepartment of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification
Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled
More informationA Fast Computer Aided Design Method for Filters
2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method
More informationA Network Intrusion Detection Method Based on Improved K-means Algorithm
Advanced Scence and Technology Letters, pp.429-433 http://dx.do.org/10.14257/astl.2014.53.89 A Network Intruson Detecton Method Based on Improved K-means Algorthm Meng Gao 1,1, Nhong Wang 1, 1 Informaton
More informationA PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS
HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,
More informationComparative Studies of Law of Conservation of Energy. and Law Clusters of Conservation of Generalized Energy
Comparatve Studes of Law of Conservaton of Energy and Law Clusters of Conservaton of Generalzed Energy No.3 of Comparatve Physcs Seres Papers Fu Yuhua (CNOOC Research Insttute, E-mal:fuyh1945@sna.com)
More informationVariability-Driven Module Selection with Joint Design Time Optimization and Post-Silicon Tuning
Asa and South Pacfc Desgn Automaton Conference 2008 Varablty-Drven Module Selecton wth Jont Desgn Tme Optmzaton and Post-Slcon Tunng Feng Wang, Xaoxa Wu, Yuan Xe The Pennsylvana State Unversty Department
More informationSensors & Transducers Published by IFSA Publishing, S. L.,
Sensors & Transducers Publshed by IFSA Publshng, S. L., 208 http://www.sensorsportal.com The Algorthm and Software Implementaton of the Thermal Transent Testng Technology Appled n Hgh-Power Electroncs
More informationFFT Based Spectrum Analysis of Three Phase Signals in Park (d-q) Plane
Proceedngs of the 00 Internatonal Conference on Industral Engneerng and Operatons Management Dhaka, Bangladesh, January 9 0, 00 FFT Based Spectrum Analyss of Three Phase Sgnals n Park (d-q) Plane Anuradha
More informationSimulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests
Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth
More informationBoise State University Department of Electrical and Computer Engineering ECE 212L Circuit Analysis and Design Lab
Bose State Unersty Department of Electrcal and omputer Engneerng EE 1L rcut Analyss and Desgn Lab Experment #8: The Integratng and Dfferentatng Op-Amp rcuts 1 Objectes The objectes of ths laboratory experment
More informationSemi-supervised Classification with Active Query Selection
Sem-supervsed Classfcaton wth Actve Query Selecton Jao Wang and Swe Luo School of Computer and Informaton Technology, Beng Jaotong Unversty, Beng 00044, Chna Wangjao088@63.com Abstract. Labeled samples
More informationGrover s Algorithm + Quantum Zeno Effect + Vaidman
Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the
More informationon the improved Partial Least Squares regression
Internatonal Conference on Manufacturng Scence and Engneerng (ICMSE 05) Identfcaton of the multvarable outlers usng T eclpse chart based on the mproved Partal Least Squares regresson Lu Yunlan,a X Yanhu,b
More informationImprovement of Histogram Equalization for Minimum Mean Brightness Error
Proceedngs of the 7 WSEAS Int. Conference on Crcuts, Systems, Sgnal and elecommuncatons, Gold Coast, Australa, January 7-9, 7 3 Improvement of Hstogram Equalzaton for Mnmum Mean Brghtness Error AAPOG PHAHUA*,
More informationOver-Temperature protection for IGBT modules
Over-Temperature protecton for IGBT modules Ke Wang 1, Yongjun Lao 2, Gaosheng Song 1, Xanku Ma 1 1 Mtsubsh Electrc & Electroncs (Shangha) Co., Ltd., Chna Room2202, Tower 3, Kerry Plaza, No.1-1 Zhongxns
More informationSimilar Constructing Method for Solving the Boundary Value Problem of the Compound Kummer Equation
Amercan Journal of Mathematcal Analyss, 05, Vol. 3, No., 39-43 Avalable onlne at http://pubs.scepub.com/ajma/3//3 Scence and Educaton Publshng DOI:0.69/ajma-3--3 Smlar Constructng Method for Solvng the
More informationApplication research on rough set -neural network in the fault diagnosis system of ball mill
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(4):834-838 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 Applcaton research on rough set -neural network n the
More informationERROR RESEARCH ON A HEPA FILTER MEDIA TESTING SYSTEM OF MPPS(MOST PENETRATION PARTICLE SIZE) EFFICIENCY
Proceedngs: Indoor Ar 2005 ERROR RESEARCH ON A HEPA FILTER MEDIA TESTING SYSTEM OF MPPS(MOST PENETRATION PARTICLE SIZE) EFFICIENCY S Lu, J Lu *, N Zhu School of Envronmental Scence and Technology, Tanjn
More informationVQ widely used in coding speech, image, and video
at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng
More informationImplementation of Parallel Multiplier Accumulator based on Radix-2 Modified Booth Algorithm Shashi Prabha Singh 1 Uma Sharma 2
IJSRD - Internatonal Journal for Scentfc Research & Development Vol. 3, Issue 05, 2015 ISSN (onlne): 2321-0613 Implementaton of Parallel Multpler Accumulator based on Radx-2 Modfed Booth Algorthm Shash
More informationWavelet chaotic neural networks and their application to continuous function optimization
Vol., No.3, 04-09 (009) do:0.436/ns.009.307 Natural Scence Wavelet chaotc neural networks and ther applcaton to contnuous functon optmzaton Ja-Ha Zhang, Yao-Qun Xu College of Electrcal and Automatc Engneerng,
More informationOperating conditions of a mine fan under conditions of variable resistance
Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety
More informationScroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator
Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua
More informationCOMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD
COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD Ákos Jósef Lengyel, István Ecsed Assstant Lecturer, Professor of Mechancs, Insttute of Appled Mechancs, Unversty of Mskolc, Mskolc-Egyetemváros,
More information6.01: Introduction to EECS 1 Week 6 October 15, 2009
6.0: ntroducton to EECS Week 6 October 5, 2009 6.0: ntroducton to EECS Crcuts The Crcut Abstracton Crcuts represent systems as connectons of component through whch currents (through arables) flow and across
More informationFast Simulation of Pyroshock Responses of a Conical Structure Using Rotation-Superposition Method
Appled Mathematcs & Informaton Scences An Internatonal Journal 211 NSP 5 (2) (211), 187S-193S Fast Smulaton of Pyroshock Responses of a Concal Structure Usng Rotaton-Superposton Method Yongjan Mao 1, Yulong
More informationModeling of Risk Treatment Measurement Model under Four Clusters Standards (ISO 9001, 14001, 27001, OHSAS 18001)
Avalable onlne at www.scencedrect.com Proceda Engneerng 37 (202 ) 354 358 The Second SREE Conference on Engneerng Modelng and Smulaton Modelng of Rsk Treatment Measurement Model under Four Clusters Standards
More informationA Particle Filter Algorithm based on Mixing of Prior probability density and UKF as Generate Importance Function
Advanced Scence and Technology Letters, pp.83-87 http://dx.do.org/10.14257/astl.2014.53.20 A Partcle Flter Algorthm based on Mxng of Pror probablty densty and UKF as Generate Importance Functon Lu Lu 1,1,
More informationStudy on Non-Linear Dynamic Characteristic of Vehicle. Suspension Rubber Component
Study on Non-Lnear Dynamc Characterstc of Vehcle Suspenson Rubber Component Zhan Wenzhang Ln Y Sh GuobaoJln Unversty of TechnologyChangchun, Chna Wang Lgong (MDI, Chna [Abstract] The dynamc characterstc
More informationAir Age Equation Parameterized by Ventilation Grouped Time WU Wen-zhong
Appled Mechancs and Materals Submtted: 2014-05-07 ISSN: 1662-7482, Vols. 587-589, pp 449-452 Accepted: 2014-05-10 do:10.4028/www.scentfc.net/amm.587-589.449 Onlne: 2014-07-04 2014 Trans Tech Publcatons,
More informationA Robust Method for Calculating the Correlation Coefficient
A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal
More informationThe Two-scale Finite Element Errors Analysis for One Class of Thermoelastic Problem in Periodic Composites
7 Asa-Pacfc Engneerng Technology Conference (APETC 7) ISBN: 978--6595-443- The Two-scale Fnte Element Errors Analyss for One Class of Thermoelastc Problem n Perodc Compostes Xaoun Deng Mngxang Deng ABSTRACT
More informationSensor Calibration Method Based on Numerical Rounding
ensors & Transducers, Vol 164, Issue, February 014, pp 5-30 ensors & Transducers 014 by IFA Publshng, L http://wwwsensorsportalcom ensor Calbraton Method Based on Numercal Roundng Youcheng WU, Jan WANG
More informationInternational Journal of Mathematical Archive-3(3), 2012, Page: Available online through ISSN
Internatonal Journal of Mathematcal Archve-3(3), 2012, Page: 1136-1140 Avalable onlne through www.ma.nfo ISSN 2229 5046 ARITHMETIC OPERATIONS OF FOCAL ELEMENTS AND THEIR CORRESPONDING BASIC PROBABILITY
More informationTemperature. Chapter Heat Engine
Chapter 3 Temperature In prevous chapters of these notes we ntroduced the Prncple of Maxmum ntropy as a technque for estmatng probablty dstrbutons consstent wth constrants. In Chapter 9 we dscussed the
More informationFormation of Pseudo-Random Sequences of Maximum Period of Transformation of Elliptic Curves
Internatonal Journal of Computatonal Engneerng Research Vol 03 Issue 5 Formaton of Pseudo-Random Sequences of Maxmum Perod of Transformaton of Ellptc Curves Alexandr Kuznetsov 1 Dmtry Prokopovych-Tkachenko
More information829. An adaptive method for inertia force identification in cantilever under moving mass
89. An adaptve method for nerta force dentfcaton n cantlever under movng mass Qang Chen 1, Mnzhuo Wang, Hao Yan 3, Haonan Ye 4, Guola Yang 5 1,, 3, 4 Department of Control and System Engneerng, Nanng Unversty,
More informationAdiabatic Sorption of Ammonia-Water System and Depicting in p-t-x Diagram
Adabatc Sorpton of Ammona-Water System and Depctng n p-t-x Dagram J. POSPISIL, Z. SKALA Faculty of Mechancal Engneerng Brno Unversty of Technology Techncka 2, Brno 61669 CZECH REPUBLIC Abstract: - Absorpton
More informationNodal analysis of finite square resistive grids and the teaching effectiveness of students projects
2 nd World Conference on Technology and Engneerng Educaton 2 WIETE Lublana Slovena 5-8 September 2 Nodal analyss of fnte square resstve grds and the teachng effectveness of students proects P. Zegarmstrz
More informationBoise State University Department of Electrical and Computer Engineering ECE 212L Circuit Analysis and Design Lab
Bose State Unersty Department of Electrcal and omputer Engneerng EE 1L rcut Analyss and Desgn Lab Experment #8: The Integratng and Dfferentatng Op-Amp rcuts 1 Objectes The objectes of ths laboratory experment
More informationTurbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH
Turbulence classfcaton of load data by the frequency and severty of wnd gusts Introducton Oscar Moñux, DEWI GmbH Kevn Blebler, DEWI GmbH Durng the wnd turbne developng process, one of the most mportant
More informationOdd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits
Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School
More informationB and H sensors for 3-D magnetic property testing
B and H sensors for 3-D magnetc property testng Zh We Ln, Jan Guo Zhu, You Guang Guo, Jn Jang Zhong, and Ha We Lu Faculty of Engneerng, Unversty of Technology, Sydney, PO Bo 123, Broadway, SW 2007, Australa
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationThis column is a continuation of our previous column
Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard
More informationEnergy Storage Elements: Capacitors and Inductors
CHAPTER 6 Energy Storage Elements: Capactors and Inductors To ths pont n our study of electronc crcuts, tme has not been mportant. The analyss and desgns we hae performed so far hae been statc, and all
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationThe stream cipher MICKEY
The stream cpher MICKEY-128 2.0 Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net 30 th June 2006 Abstract: We
More informationCalculation of time complexity (3%)
Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add
More informationOrientation Model of Elite Education and Mass Education
Proceedngs of the 8th Internatonal Conference on Innovaton & Management 723 Orentaton Model of Elte Educaton and Mass Educaton Ye Peng Huanggang Normal Unversty, Huanggang, P.R.Chna, 438 (E-mal: yepeng@hgnc.edu.cn)
More informationCryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm
www.ijcsi.org 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce
More informationFuzzy Boundaries of Sample Selection Model
Proceedngs of the 9th WSES Internatonal Conference on ppled Mathematcs, Istanbul, Turkey, May 7-9, 006 (pp309-34) Fuzzy Boundares of Sample Selecton Model L. MUHMD SFIIH, NTON BDULBSH KMIL, M. T. BU OSMN
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(5): Research Article
Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 014, 6(5):1683-1688 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 Multple mode control based on VAV ar condtonng system
More informationProgramming Project 1: Molecular Geometry and Rotational Constants
Programmng Project 1: Molecular Geometry and Rotatonal Constants Center for Computatonal Chemstry Unversty of Georga Athens, Georga 30602 Summer 2012 1 Introducton Ths programmng project s desgned to provde
More informationAging model for a 40 V Nch MOS, based on an innovative approach F. Alagi, R. Stella, E. Viganò
Agng model for a 4 V Nch MOS, based on an nnovatve approach F. Alag, R. Stella, E. Vganò ST Mcroelectroncs Cornaredo (Mlan) - Italy Agng modelng WHAT IS AGING MODELING: Agng modelng s a tool to smulate
More informationLecture 5, October 8. DES System (Modification)
Lecture 5, October 8. 10/10/01 Gene Tsudk, ICS 268 Fall 2001 1 Encrypton Process 64 Bt Plantext Intal Permutaton 32 Bt L0 32 Bt R0 + F(R0,K1) DES System (Modfcaton) Festel Network Buldng Block Key Schedule
More informationHiding data in images by simple LSB substitution
Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty
More informationA New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane
A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,
More informationNote on EM-training of IBM-model 1
Note on EM-tranng of IBM-model INF58 Language Technologcal Applcatons, Fall The sldes on ths subject (nf58 6.pdf) ncludng the example seem nsuffcent to gve a good grasp of what s gong on. Hence here are
More informationPower Efficient Design and Implementation of a Novel Constant Correction Truncated Multiplier
APSIPA ASC 11 X an Power Effcent Desgn and Implementaton of a Novel Constant Correcton Truncated Multpler Yu Ren, Dong Wang, Lebo Lu, Shouy Yn and Shaojun We Tsnghua Unversty, Bejng E-mal: reneereny@gmal.com
More informationAdvanced Circuits Topics - Part 1 by Dr. Colton (Fall 2017)
Advanced rcuts Topcs - Part by Dr. olton (Fall 07) Part : Some thngs you should already know from Physcs 0 and 45 These are all thngs that you should have learned n Physcs 0 and/or 45. Ths secton s organzed
More informationMagnetic Field Around The New 400kV OH Power Transmission Lines In Libya
ECENT ADVANCES n ENEGY & ENVIONMENT Magnetc Feld Around The New kv OH Power Transmsson Lnes In Lbya JAMAL M. EHTAIBA * SAYEH M. ELHABASHI ** Organzaton for Development of Admnstratve Centers, ODAC MISUATA
More informationUsing Immune Genetic Algorithm to Optimize BP Neural Network and Its Application Peng-fei LIU1,Qun-tai SHEN1 and Jun ZHI2,*
Advances n Computer Scence Research (ACRS), volume 54 Internatonal Conference on Computer Networks and Communcaton Technology (CNCT206) Usng Immune Genetc Algorthm to Optmze BP Neural Network and Its Applcaton
More informationExperience with Automatic Generation Control (AGC) Dynamic Simulation in PSS E
Semens Industry, Inc. Power Technology Issue 113 Experence wth Automatc Generaton Control (AGC) Dynamc Smulaton n PSS E Lu Wang, Ph.D. Staff Software Engneer lu_wang@semens.com Dngguo Chen, Ph.D. Staff
More information5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) Star image identification uninfluenced by rotation
5th Internatonal Conference on Measurement, Instrumentaton and Automaton (ICMIA 2016) Star mage dentfcaton unnfluenced by rotaton Jang D1,a, Zhang Ke1, Lv Mebo1 1 Nortwestern Polytechncal Unversty, X an,
More informationCopyright 2004 by Oxford University Press, Inc.
JT as an Amplfer &a Swtch, Large Sgnal Operaton, Graphcal Analyss, JT at D, asng JT, Small Sgnal Operaton Model, Hybrd P-Model, TModel. Lecture # 7 1 Drecton of urrent Flow & Operaton for Amplfer Applcaton
More informationMA 323 Geometric Modelling Course Notes: Day 13 Bezier Curves & Bernstein Polynomials
MA 323 Geometrc Modellng Course Notes: Day 13 Bezer Curves & Bernsten Polynomals Davd L. Fnn Over the past few days, we have looked at de Casteljau s algorthm for generatng a polynomal curve, and we have
More informationClock-Gating and Its Application to Low Power Design of Sequential Circuits
Clock-Gatng and Its Applcaton to Low Power Desgn of Sequental Crcuts ng WU Department of Electrcal Engneerng-Systems, Unversty of Southern Calforna Los Angeles, CA 989, USA, Phone: (23)74-448 Massoud PEDRAM
More informationHigh resolution entropy stable scheme for shallow water equations
Internatonal Symposum on Computers & Informatcs (ISCI 05) Hgh resoluton entropy stable scheme for shallow water equatons Xaohan Cheng,a, Yufeng Ne,b, Department of Appled Mathematcs, Northwestern Polytechncal
More informationA Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2 n )
Reconfgurable System on Chp Implementaton for Ellptc Curve Cryptography over GF( n ) Mchael Jung, M. Ernst, F. Madlener, S. Huss, R. lümel Integrated Crcuts and Systems Lab Computer Scence Department Darmstadt
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationPerformance Analysis of the Postcomputation- Based Generic-Point Parallel Scalar Multiplication Method
P a g e 3 Vol. 1 Issue 11 (Ver. 1.) October 1 Global Journal of Computer Scence and Technology Performance Analyss of the Postcomputaton- Based Generc-Pont Parallel Scalar Multplcaton Method Tur F. Al-Soman
More informationChapter 9: Statistical Inference and the Relationship between Two Variables
Chapter 9: Statstcal Inference and the Relatonshp between Two Varables Key Words The Regresson Model The Sample Regresson Equaton The Pearson Correlaton Coeffcent Learnng Outcomes After studyng ths chapter,
More informationOn the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros
Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong
More informationTuring Machines (intro)
CHAPTER 3 The Church-Turng Thess Contents Turng Machnes defntons, examples, Turng-recognzable and Turng-decdable languages Varants of Turng Machne Multtape Turng machnes, non-determnstc Turng Machnes,
More informationREAL-TIME DETERMINATION OF INDOOR CONTAMINANT SOURCE LOCATION AND STRENGTH, PART II: WITH TWO SENSORS. Beijing , China,
REAL-TIME DETERMIATIO OF IDOOR COTAMIAT SOURCE LOCATIO AD STREGTH, PART II: WITH TWO SESORS Hao Ca,, Xantng L, Wedng Long 3 Department of Buldng Scence, School of Archtecture, Tsnghua Unversty Bejng 84,
More informationSome Comments on Accelerating Convergence of Iterative Sequences Using Direct Inversion of the Iterative Subspace (DIIS)
Some Comments on Acceleratng Convergence of Iteratve Sequences Usng Drect Inverson of the Iteratve Subspace (DIIS) C. Davd Sherrll School of Chemstry and Bochemstry Georga Insttute of Technology May 1998
More informationOne-sided finite-difference approximations suitable for use with Richardson extrapolation
Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,
More informationAn Improved multiple fractal algorithm
Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton
More informationCryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-bit Block and n-bit Key
Cryptanalyss of Some Double-Block-Length Hash Modes of Block Cphers wth n-bt Block and n-bt Key Deukjo Hong and Daesung Kwon Abstract In ths paper, we make attacks on DBL (Double-Block-Length) hash modes
More informationTOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION
1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:
More informationNumerical modelization by finite differences of a thermoelectric refrigeration device of double jump". Experimental validation.
Numercal modelzaton by fnte dfferences of a thermoelectrc refrgeraton devce of double jump". Expermental valdaton. A. Rodríguez, J.G. Ván, D. Astran, Dpto. Ingenería Mecánca, Energétca y de Materales.
More informationMarkov Chain Monte Carlo Lecture 6
where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways
More informationFREQUENCY DISTRIBUTIONS Page 1 of The idea of a frequency distribution for sets of observations will be introduced,
FREQUENCY DISTRIBUTIONS Page 1 of 6 I. Introducton 1. The dea of a frequency dstrbuton for sets of observatons wll be ntroduced, together wth some of the mechancs for constructng dstrbutons of data. Then
More informationAnnexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances
ec Annexes Ths Annex frst llustrates a cycle-based move n the dynamc-block generaton tabu search. It then dsplays the characterstcs of the nstance sets, followed by detaled results of the parametercalbraton
More information(Online First)A Lattice Boltzmann Scheme for Diffusion Equation in Spherical Coordinate
Internatonal Journal of Mathematcs and Systems Scence (018) Volume 1 do:10.494/jmss.v1.815 (Onlne Frst)A Lattce Boltzmann Scheme for Dffuson Equaton n Sphercal Coordnate Debabrata Datta 1 *, T K Pal 1
More information