92,972 research outputs found

    Electromagnetic analysis

    Get PDF
    Tato práce se zabývá problematikou elektromagnetické analýzy a aplikací elektromagnetického postranního kanálu. První a druhá část práce popisují základy kryptografie, funkci kryptografického modulu a útoky vedené postranními kanály. Třetí část práce rozebírá možnosti elektromagnetické analýzy, konstrukci sondy, popis laboratorního pracoviště, elektromagnetickou emisi PIC16F84A, algoritmus AES a přípravu na laboratorní měření. Čtvrtá část práce popisuje konkrétní laboratorní měření a extrakci užitečného signálu. V páté části práce jsou uvedeny výsledky zpracování naměřených hodnot, výstupy vytvořených skriptů a zjištěné souvislosti mezi naměřenými průběhy a šifrovacím klíčem algoritmu AES. V šesté části práce jsou rozebrány základní možnosti obrany proti útoku postranním kanálem.This thesis deals with electromagnetic analysis and applications of electromagnetic side channel. The first and second part describes the basics of cryptography, function of cryptographic module and side-channel attacks. The third part discusses the electromagnetic analysis, construction of probe, a description of the laboratory workplace, the electromagnetic emission of PIC16F84A, AES and preparation for laboratory measurements. The fourth part describes specific laboratory measurements and extracting the useful signal. In the fifth part of the thesis presents the results of processing the measured values, the outputs generated by scripts and found the link between measured curves and AES encryption key. In the sixth part of the thesis are analyzed the basics of defense against side channel attack.

    Centrifugal Compressors 101: Part 1

    Get PDF
    Short CoursesReciprocating and centrifugal compressor similarities/ differences -How do they work? (Potential Energy, Kinetic Energy, PE, KE, …) -History of compressors – Timeline, major advances – Configurations, straight-through, back-to-back, compound, side streams, double-flow -Markets served -Pressure containment – Case – Nozzles and flang -Selection Process – Aerodynamic Selection – Mechanical Design – Rotordynamic Design Impellers – Design Basics -Stationary Aero Components – Inlet, inlet guide – Diffuser, vaned and vaneless, LSD – Volute and collector – Return bend / Return channel -Compressor Performance – Nomenclature – Impact of Operating Conditions – Internal Leakage – Surge Control -Rotordynamics – Critical speed maps – Synchronous unbalance response – Stability, log decrement – Damper seals – Bearings, seals – TP, Sleeve, magnetic – Squeeze film damper – Steady state and transient torsional -Stress analysis – Impeller dynamics -Acoustics -Seals – Gas seals – Oil film seals – Lab

    Basics of Generalized Unitarity

    Full text link
    We review generalized unitarity as a means for obtaining loop amplitudes from on-shell tree amplitudes. The method is generally applicable to both supersymmetric and non-supersymmetric amplitudes, including non-planar contributions. Here we focus mainly on N=4 Yang-Mills theory, in the context of on-shell superspaces. Given the need for regularization at loop level, we also review a six-dimensional helicity-based superspace formalism and its application to dimensional and massive regularizations. An important feature of the unitarity method is that it offers a means for carrying over any identified tree-level property of on-shell amplitudes to loop level, though sometimes in a modified form. We illustrate this with examples of dual conformal symmetry and a recently discovered duality between color and kinematics.Comment: 37 pages, 10 figures. Invited review for a special issue of Journal of Physics A devoted to "Scattering Amplitudes in Gauge Theories", R. Roiban(ed), M. Spradlin(ed), A. Volovich(ed

    Detecting time-fragmented cache attacks against AES using Performance Monitoring Counters

    Get PDF
    Cache timing attacks use shared caches in multi-core processors as side channels to extract information from victim processes. These attacks are particularly dangerous in cloud infrastructures, in which the deployed countermeasures cause collateral effects in terms of performance loss and increase in energy consumption. We propose to monitor the victim process using an independent monitoring (detector) process, that continuously measures selected Performance Monitoring Counters (PMC) to detect the presence of an attack. Ad-hoc countermeasures can be applied only when such a risky situation arises. In our case, the victim process is the AES encryption algorithm and the attack is performed by means of random encryption requests. We demonstrate that PMCs are a feasible tool to detect the attack and that sampling PMCs at high frequencies is worse than sampling at lower frequencies in terms of detection capabilities, particularly when the attack is fragmented in time to try to be hidden from detection

    Mass-Matching in Higgsless

    Full text link
    Modern extra-dimensional Higgsless scenarios rely on a mass-matching between fermionic and bosonic KK resonances to evade constraints from precision electroweak measurements. After analyzing all of the Tevatron and LEP bounds on these so-called Cured Higgsless scenarios, we study their LHC signatures and explore how to identify the mass-matching mechanism, the key to their viability. We find singly and pair produced fermionic resonances show up as clean signals with 2 or 4 leptons and 2 hard jets, while neutral and charged bosonic resonances are visible in the dilepton and leptonic WZ channels, respectively. A measurement of the resonance masses from these channels shows the matching necessary to achieve S0S\simeq 0. Moreover, a large single production of KK-fermion resonances is a clear indication of compositeness of SM quarks. Discovery reach is below 10 fb1^{-1} of luminosity for resonances in the 700 GeV range.Comment: 28 pages, 18 figure

    Expansion of the Planet Detection Channels in Next-Generation Microlensing Surveys

    Full text link
    We classify various types of planetary lensing signals and the channels of detecting them. We estimate the relative frequencies of planet detections through the individual channels with special emphasis on the new channels to be additionally provided by future lensing experiments that will survey wide fields continuously at high cadence by using very large-format imaging cameras. From this investigation, we find that the fraction of wide-separation planets that would be discovered through the new channels of detecting planetary signals as independent and repeating events would be substantial. We estimate that the fraction of planets detectable through the new channels would comprise ~15 -- 30% of all planets depending on the models of the planetary separation distribution and mass ratios of planets. Considering that a significant fraction of planets might exist in the form of free-floating planets, the frequency of planets to be detected through the new channel would be even higher. With the expansion of the channels of detecting planet, future lensing surveys will greatly expand the range of planets to be probed.Comment: 6 pages, 3 figures, one tabl
    corecore