ID |
原文 |
译文 |
16705 |
有鉴于此,该文提出一种基于似然函数的HFM信号参数估计快速算法。 |
In view of this, thispaper proposes a Fast Algorithm for Parameter Estimation of Hyperbolic Frequency Modulation Signals Basedon Likelihood Function. |
16706 |
文中首先推导出HFM信号的Cramer-Rao下界作为参数估计的性能评估标准; |
Firstly, the Cramer-Rao lower bound of the HFM signal is derived as the performanceevaluation standard for parameter estimation; |
16707 |
然后基于高斯随机噪声,构建了HFM信号的似然函数,并结合数据向量化的特点提出一种改进的适应度函数,最后利用全局最优引导人工蜂群(GABC)算法对该适应度函数进行极值寻优,从而实现HFM信号的参数估计; |
Then based on the Gaussian random noise, the likelihoodfunction of the HFM signal is constructed, and an improved fitness function is proposed in combination withthe characteristics of data vectorization, then the Global best guided Artificial Bee Colony (GABC) algorithmis used to optimize the fitness function to realize the parameter estimation of the HFM signal. |
16708 |
通过蒙特卡洛仿真证明了该方法在信噪比为3 dB以上时,HFM信号的参数估计结果的均方误差更逼近Cramer-Rao下界,且运算量约是原来的1/3,在保证估计精度的同时提高算法收敛速度。 |
Finally, MonteCarlo simulation results show that, compared to the method before the improvement, the mean square error ofthe parameter estimation result of the HFM signal is closer to the Cramer-Rao lower bound when the signal-to-noise ratio is more the 3 dB, and the amount of calculation is about one-third of the method beforeimprovement, which improves the algorithm convergence speed while ensuring the estimation accuracy. |
16709 |
密码设备面临故障攻击的威胁,针对密码芯片的故障攻击手段研究是密码学和硬件安全领域的重要研究方向。 |
The security of crypto system is threatened by fault attacks, and implementation of fault attacks for crypto chips become an important research direction in the field of cryptography and hardware security. |
16710 |
脉冲激光具有较好的时空分辨性,是一种准确度较高的故障攻击手段。 |
The pulse laser is a method with high accuracy for its high temporal-spatial resolution. |
16711 |
该文详细描述了激光注入攻击的原理和方法,以集成AES-128算法的微控制器(MCU)为例实施了激光注入攻击实验。 |
In this paper, the principleand method of laser injection attacks are described in detail, and experiments are carried out on a Micro-Controller Unit (MCU) with AES-128 algorithm as an example. |
16712 |
实验以微控制器的SRAM为攻击目标,分别成功实现了差分故障攻击和子密钥编排攻击,恢复了其16 Byte的完整密钥,其中后一种攻击是目前首次以激光的手段实现。 |
The SRAMs of the MCU are taken as theattack targets. Differential fault attack and the subkey expansion attack are successfully implemented, and the16 Byte complete keys are recovered respectively. The latter attack is first implemented by the laser. |
16713 |
研究表明,激光注入攻击能准确定位关键数据存放的物理位置,并能在任意的操作中引入错误,实现单比特的数据翻转,满足故障攻击模型的需求。 |
The research shows that laser injection attack has many benefits to meet the requirements of fault attack models, including accurate location of critical data, error injection in any operation, and generation of single bit flip. |
16714 |
激光注入攻击能在较短时间内完成自动攻击和密文收集,攻击过程贴近真实场景,对密码芯片具有极大的威胁。 |
The laser injection attacks and ciphertext collection can be completed automatically in a short time in a nearly real-life scenario, which has a great threat to the crypto chips. |