Results 11 to 20 of about 1,839,896 (336)
A differential analysis of the power flow equations [PDF]
The AC power flow equations are fundamental in all aspects of power systems planning and operations. They are routinely solved using Newton-Raphson like methods.
Chertkov, Michael +2 more
core +5 more sources
Normalized Differential Power Analysis - for Ghost Peaks Mitigation [PDF]
The attack efficacy of Differential Power Analysis (DPA), a popular side channel evaluation technique for key extraction, is compromised by the false highest Difference Of Means (DOMs) value ('ghost peaks') in the DOMs matrix produced in a conventional DPA.
Juncheng Chen +8 more
openalex +3 more sources
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring [PDF]
Power analysis is a serious attack to implementation of elliptic curve cryptosystems (ECC) on smart cards. For ECC, many power analysis attacks and countermeasures have been proposed. In this paper, we propose a novel power analysis attack using differential power between modular multiplication and modular squaring.
Toru Akishita, Tsuyoshi Takagi
openalex +2 more sources
Introduction to differential power analysis [PDF]
The power consumed by a circuit varies according to the activity of its individual transistors and other components. As a result, measurements of the power used by actual computers or microchips contain information about the operations being performed and the data being processed.
Paul C. Kocher +3 more
openaire +1 more source
Power Flow Analysis of Islanded Microgrids: A Differential Evolution Approach
Power flow (PF) analysis of microgrids (MGs) has been gaining a lot of attention due to the evolution of islanded MGs. To calculate islanded MGs’ PF solution, a globally convergent technique is proposed using Differential Evolution (DE)- a popular
Abhishek Kumar +3 more
doaj +1 more source
On Practical Results of the Differential Power Analysis [PDF]
This paper describes practical differential power analysis attacks. There are presented successful and unsuccessful attack attempts with the description of the attack methodology. It provides relevant information about oscilloscope settings, optimization possibilities and fundamental attack principles, which are important when realizing this type of ...
Jakub Breier, Marcel Kleja
openalex +3 more sources
Optimization Technique for High-Gain CMOS Power Amplifier for 5G Applications
In this study, a differential power amplifier (PA) with a high gain of over 30 dB by configuring a three-stage common source unit amplifier was designed.
Hayeon Jeong +5 more
doaj +1 more source
Homogeneous Mapping Model of ECC for Preventing Differential Power Analysis [PDF]
Existing public key research is based on increasing the redundance operation of Elliptic Curve Cryptosystems(ECC) aginst Differential Power Analysis(DPA) attacks,it causes ECC efficiency low,and affects the application of ECC in computation resource ...
WU Keke,LI Huiyun,YAN Lijun
doaj +1 more source
Nove lincidence matrix differential power analysis for resisting ghost peak
At present, differential power analysis (DPA) is one of the most important threats to the security of block ciphers in chips.When the collected power trace is insufficient, DPA is vulnerable to ghost peak caused by the difference mean value generated by ...
Zijing JIANG, Qun DING
doaj +2 more sources
On Second-Order Differential Power Analysis [PDF]
Differential Power Analysis (DPA) is a powerful cryptanalytic technique aiming at extracting secret data from a cryptographic device by collecting power consumption traces and averaging over a series of acquisitions. In order to prevent the leakage, hardware designers and software programmers make use of masking techniques (a.k.a.
Joye, M., Paillier, P., Schoenmakers, B.
openaire +2 more sources

