排序方式: 共有25条查询结果,搜索用时 0 毫秒
1.
低成本板级电源的几种方案及合理设计 总被引:1,自引:0,他引:1
本文简要介绍几种低成本板级电源的解决方案,然后重点介绍如何合理设计,以减小电源纹波和噪音,有更好的电磁兼容性,最后介绍了测试的注意事项。 相似文献
2.
3.
Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%. 相似文献
4.
本文简要分析了在不可靠网络协议的上层提供可靠性的方式,阐述了消息队列中间件在传输层使用了UDP协议的原因,进而分析了TCP协议的流量控制模型,着重介绍了慢启动、拥塞避免、快速重传和快速恢复的算法和目的。介绍了常用的RTT、RTO的计算公式。对照TCP协议,介绍了中间件为提供高效、可靠的网络传送而采用的拥塞控制模型。 相似文献
5.
提出了一种结合使用对称加密和隐写术的反取证方法。该方法用对称加密和异或运算对文件进行隐秘处理,较好地缓解了传统对称加密中短密钥便于记忆和长密钥更加安全之间的矛盾。在对称密钥泄露的情况下仍能保证隐秘文件的安全。该方法用低开销大幅度提高了破解难度,对隐写的载体文件没有特殊要求,适合在反取证环境中使用。根据此方法,开发了基于Windows平台的反取证原型工具Steg Encrypt,该命令行工具可用于使保存或传送的文件难以暴力破解。 相似文献
6.
7.
8.
9.
Despite the large size of most communication and transportation systems,there are short paths between nodes in these networks which guarantee the efficient information,data and passenger delivery;furthermore these networks have a surprising tolerance under random errors thanks to their inherent scale-free topology.However,their scale-free topology also makes them fragile under intentional attacks,leaving us a challenge on how to improve the network robustness against intentional attacks without losing their strong tolerance under random errors and high message and passenger delivering capacity.Here we propose two methods (SL method and SH method) to enhance scale-free network’s tolerance under attack in different conditions. 相似文献
10.