The dual distance model of tourism movement in intra-regional travel

2020 ◽  
pp. 1-9 ◽  
Author(s):  
IpKin Anthony Wong ◽  
Gongpeng Zhang ◽  
Yuangang Zhang ◽  
GuoQiong Ivanka Huang
Keyword(s):  
1977 ◽  
Vol 5 (1) ◽  
pp. 21-39 ◽  
Author(s):  
Christopher Winship
Keyword(s):  

2011 ◽  
Vol 19 (22) ◽  
pp. 6881-6884 ◽  
Author(s):  
Tadao Takada ◽  
Yumiko Otsuka ◽  
Mitsunobu Nakamura ◽  
Kazushige Yamana

2011 ◽  
Vol 121-126 ◽  
pp. 867-871 ◽  
Author(s):  
Jie Li ◽  
Wei Wei Shan ◽  
Chao Xuan Tian

In order to evaluate the security of Application Specific Integrated Circuit (ASIC) implemented cryptographic algorithms at an early design stage, a Hamming distance model based power analysis is proposed. The Data Encryption Standard (DES) algorithm is taken as an example to illustrate the threats of differential power analysis (DPA) attack against the security of ASIC chip. A DPA attack against the ASIC implementation of a DES algorithm is realized based on hamming distance power model (HD model), and it realized the attack by successfully guessing the right 48-bit subkey. This result indicates that the power analysis attack based on the HD model is simple, rapid and effective for the design and evaluation of security chips.


Sign in / Sign up

Export Citation Format

Share Document