92,972 research outputs found
Electromagnetic analysis
Tato práce se zabývá problematikou elektromagnetické analýzy a aplikací elektromagnetického postranního kanálu. První a druhá část práce popisují základy kryptografie, funkci kryptografického modulu a útoky vedené postranními kanály. Třetí část práce rozebírá možnosti elektromagnetické analýzy, konstrukci sondy, popis laboratorního pracoviště, elektromagnetickou emisi PIC16F84A, algoritmus AES a přípravu na laboratorní měření. Čtvrtá část práce popisuje konkrétní laboratorní měření a extrakci užitečného signálu. V páté části práce jsou uvedeny výsledky zpracování naměřených hodnot, výstupy vytvořených skriptů a zjištěné souvislosti mezi naměřenými průběhy a šifrovacím klíčem algoritmu AES. V šesté části práce jsou rozebrány základní možnosti obrany proti útoku postranním kanálem.This thesis deals with electromagnetic analysis and applications of electromagnetic side channel. The first and second part describes the basics of cryptography, function of cryptographic module and side-channel attacks. The third part discusses the electromagnetic analysis, construction of probe, a description of the laboratory workplace, the electromagnetic emission of PIC16F84A, AES and preparation for laboratory measurements. The fourth part describes specific laboratory measurements and extracting the useful signal. In the fifth part of the thesis presents the results of processing the measured values, the outputs generated by scripts and found the link between measured curves and AES encryption key. In the sixth part of the thesis are analyzed the basics of defense against side channel attack.
Centrifugal Compressors 101: Part 1
Short CoursesReciprocating and centrifugal compressor similarities/ differences
-How do they work? (Potential Energy, Kinetic Energy, PE, KE, …)
-History of compressors
– Timeline, major advances
– Configurations, straight-through, back-to-back, compound, side
streams, double-flow
-Markets served
-Pressure containment
– Case
– Nozzles and flang
-Selection Process
– Aerodynamic Selection
– Mechanical Design
– Rotordynamic Design Impellers
– Design Basics
-Stationary Aero Components
– Inlet, inlet guide
– Diffuser, vaned and vaneless, LSD
– Volute and collector
– Return bend / Return channel
-Compressor Performance
– Nomenclature
– Impact of Operating Conditions
– Internal Leakage
– Surge Control
-Rotordynamics
– Critical speed maps
– Synchronous unbalance response
– Stability, log decrement
– Damper seals
– Bearings, seals
– TP, Sleeve, magnetic
– Squeeze film damper
– Steady state and transient torsional
-Stress analysis
– Impeller dynamics
-Acoustics
-Seals
– Gas seals
– Oil film seals
– Lab
Basics of Generalized Unitarity
We review generalized unitarity as a means for obtaining loop amplitudes from
on-shell tree amplitudes. The method is generally applicable to both
supersymmetric and non-supersymmetric amplitudes, including non-planar
contributions. Here we focus mainly on N=4 Yang-Mills theory, in the context of
on-shell superspaces. Given the need for regularization at loop level, we also
review a six-dimensional helicity-based superspace formalism and its
application to dimensional and massive regularizations. An important feature of
the unitarity method is that it offers a means for carrying over any identified
tree-level property of on-shell amplitudes to loop level, though sometimes in a
modified form. We illustrate this with examples of dual conformal symmetry and
a recently discovered duality between color and kinematics.Comment: 37 pages, 10 figures. Invited review for a special issue of Journal
of Physics A devoted to "Scattering Amplitudes in Gauge Theories", R.
Roiban(ed), M. Spradlin(ed), A. Volovich(ed
Detecting time-fragmented cache attacks against AES using Performance Monitoring Counters
Cache timing attacks use shared caches in multi-core processors as side
channels to extract information from victim processes. These attacks are
particularly dangerous in cloud infrastructures, in which the deployed
countermeasures cause collateral effects in terms of performance loss and
increase in energy consumption. We propose to monitor the victim process using
an independent monitoring (detector) process, that continuously measures
selected Performance Monitoring Counters (PMC) to detect the presence of an
attack. Ad-hoc countermeasures can be applied only when such a risky situation
arises. In our case, the victim process is the AES encryption algorithm and the
attack is performed by means of random encryption requests. We demonstrate that
PMCs are a feasible tool to detect the attack and that sampling PMCs at high
frequencies is worse than sampling at lower frequencies in terms of detection
capabilities, particularly when the attack is fragmented in time to try to be
hidden from detection
Mass-Matching in Higgsless
Modern extra-dimensional Higgsless scenarios rely on a mass-matching between
fermionic and bosonic KK resonances to evade constraints from precision
electroweak measurements. After analyzing all of the Tevatron and LEP bounds on
these so-called Cured Higgsless scenarios, we study their LHC signatures and
explore how to identify the mass-matching mechanism, the key to their
viability. We find singly and pair produced fermionic resonances show up as
clean signals with 2 or 4 leptons and 2 hard jets, while neutral and charged
bosonic resonances are visible in the dilepton and leptonic WZ channels,
respectively. A measurement of the resonance masses from these channels shows
the matching necessary to achieve . Moreover, a large single
production of KK-fermion resonances is a clear indication of compositeness of
SM quarks. Discovery reach is below 10 fb of luminosity for resonances
in the 700 GeV range.Comment: 28 pages, 18 figure
Expansion of the Planet Detection Channels in Next-Generation Microlensing Surveys
We classify various types of planetary lensing signals and the channels of
detecting them. We estimate the relative frequencies of planet detections
through the individual channels with special emphasis on the new channels to be
additionally provided by future lensing experiments that will survey wide
fields continuously at high cadence by using very large-format imaging cameras.
From this investigation, we find that the fraction of wide-separation planets
that would be discovered through the new channels of detecting planetary
signals as independent and repeating events would be substantial. We estimate
that the fraction of planets detectable through the new channels would comprise
~15 -- 30% of all planets depending on the models of the planetary separation
distribution and mass ratios of planets. Considering that a significant
fraction of planets might exist in the form of free-floating planets, the
frequency of planets to be detected through the new channel would be even
higher. With the expansion of the channels of detecting planet, future lensing
surveys will greatly expand the range of planets to be probed.Comment: 6 pages, 3 figures, one tabl
- …