The Wilson coefficients of the standard model effective field theory are subject to a series of positivity bounds.It has been shown that while the positivity part of the ultraviolet(UV)partial wave unitarity leads to ...The Wilson coefficients of the standard model effective field theory are subject to a series of positivity bounds.It has been shown that while the positivity part of the ultraviolet(UV)partial wave unitarity leads to the Wilson coefficients living in a convex cone,further including the nonpositivity part caps the cone from above.For Higgs scattering,a capped positivity cone was obtained using a simplified,linear unitarity condition without utilizing the full internal symmetries of Higgs scattering.Here,we further implement stronger nonlinear unitarity conditions from the UV,which generically gives rise to better bounds.We show that,for the Higgs case in particular,while the nonlinear unitarity conditions per se do not enhance the bounds,the fuller use of the internal symmetries do shrink the capped positivity cone significantly.展开更多
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P...Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks.展开更多
In the light of the problem of weak reflection signals shielded by strong reflections from the concrete surface,the detection and the recognition of hidden micro-cracks in the shield tunnel lining were studied using t...In the light of the problem of weak reflection signals shielded by strong reflections from the concrete surface,the detection and the recognition of hidden micro-cracks in the shield tunnel lining were studied using the orthogonal matching pursuit and the Hilbert transform(OMHT method).First,according to the matching pursuit algorithm and the strong reflection-forming mechanism,and based on the sparse representation theory,a sparse dictionary,adapted to the characteristics of the strong reflection signal,was selected,and a matching decomposition of each signal was performed so that the weak target signal submerged in the strong reflection was displayed more strongly.Second,the Hilbert transform was used to extract multiple parameters,such as the instantaneous amplitude,the instantaneous frequency,and the instantaneous phase,from the processed signal,and the ground penetrating radar(GPR)image was comprehensively analyzed and determined from multiple angles.The results show that the OMHT method can accurately weaken the effect of the strong impedance interface and effectively enhance the weak reflected signal energy of hidden micro-crack in the shield tunnel segment.The resolution of the processed GPR image is greatly improved,and the reflected signal of the hidden micro-crack is easily visible,which proves the validity and accuracy of the analysis method.展开更多
Gas–liquid two-phase flow abounds in industrial processes and facilities. Identification of its flow pattern plays an essential role in the field of multiphase flow measurement. A bluff body was introduced in this s...Gas–liquid two-phase flow abounds in industrial processes and facilities. Identification of its flow pattern plays an essential role in the field of multiphase flow measurement. A bluff body was introduced in this study to recognize gas–liquid flow patterns by inducing fluid oscillation that enlarged differences between each flow pattern. Experiments with air–water mixtures were carried out in horizontal pipelines at ambient temperature and atmospheric pressure. Differential pressure signals from the bluff-body wake were obtained in bubble, bubble/plug transitional, plug, slug, and annular flows. Utilizing the adaptive ensemble empirical mode decomposition method and the Hilbert transform, the time–frequency entropy S of the differential pressure signals was obtained. By combining S and other flow parameters, such as the volumetric void fraction β, the dryness x, the ratio of density φ and the modified fluid coefficient ψ, a new flow pattern map was constructed which adopted S(1–x)φ and (1–β)ψ as the vertical and horizontal coordinates, respectively. The overall rate of classification of the map was verified to be 92.9% by the experimental data. It provides an effective and simple solution to the gas–liquid flow pattern identification problems.展开更多
The idea of positional inverted index is exploited for indexing of graph database. The main idea is the use of hashing tables in order to prune a considerable portion of graph database that cannot contain the answer s...The idea of positional inverted index is exploited for indexing of graph database. The main idea is the use of hashing tables in order to prune a considerable portion of graph database that cannot contain the answer set. These tables are implemented using column-based techniques and are used to store graphs of database, frequent sub-graphs and the neighborhood of nodes. In order to exact checking of remaining graphs, the vertex invariant is used for isomorphism test which can be parallel implemented. The results of evaluation indicate that proposed method outperforms existing methods.展开更多
基金supported by the Fundamental Research Funds for the Central Universities(WK2030000036)the National Natural Science Foundation of China(12075233).
文摘The Wilson coefficients of the standard model effective field theory are subject to a series of positivity bounds.It has been shown that while the positivity part of the ultraviolet(UV)partial wave unitarity leads to the Wilson coefficients living in a convex cone,further including the nonpositivity part caps the cone from above.For Higgs scattering,a capped positivity cone was obtained using a simplified,linear unitarity condition without utilizing the full internal symmetries of Higgs scattering.Here,we further implement stronger nonlinear unitarity conditions from the UV,which generically gives rise to better bounds.We show that,for the Higgs case in particular,while the nonlinear unitarity conditions per se do not enhance the bounds,the fuller use of the internal symmetries do shrink the capped positivity cone significantly.
基金National Natural Science Foundation of China(62472397)Innovation Program for Quantum Science and Technology(2021ZD0302902)。
文摘Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks.
基金Projects(51678071,51608183)supported by the National Natural Science Foundation of ChinaProjects(CX2018B530,CX2018B531)supported by the Postgraduate Research and Innovation-funded Project of Hunan Province,ChinaProjects(16BCX13,16BCX09)supported by Changsha University of Science and Technology,China
文摘In the light of the problem of weak reflection signals shielded by strong reflections from the concrete surface,the detection and the recognition of hidden micro-cracks in the shield tunnel lining were studied using the orthogonal matching pursuit and the Hilbert transform(OMHT method).First,according to the matching pursuit algorithm and the strong reflection-forming mechanism,and based on the sparse representation theory,a sparse dictionary,adapted to the characteristics of the strong reflection signal,was selected,and a matching decomposition of each signal was performed so that the weak target signal submerged in the strong reflection was displayed more strongly.Second,the Hilbert transform was used to extract multiple parameters,such as the instantaneous amplitude,the instantaneous frequency,and the instantaneous phase,from the processed signal,and the ground penetrating radar(GPR)image was comprehensively analyzed and determined from multiple angles.The results show that the OMHT method can accurately weaken the effect of the strong impedance interface and effectively enhance the weak reflected signal energy of hidden micro-crack in the shield tunnel segment.The resolution of the processed GPR image is greatly improved,and the reflected signal of the hidden micro-crack is easily visible,which proves the validity and accuracy of the analysis method.
基金Project(51576213)supported by the National Natural Science Foundation of ChinaProject(2015RS4015)supported by the Hunan Scientific Program,ChinaProject(2016zzts323)supported by the Innovation Project of Central South University,China
文摘Gas–liquid two-phase flow abounds in industrial processes and facilities. Identification of its flow pattern plays an essential role in the field of multiphase flow measurement. A bluff body was introduced in this study to recognize gas–liquid flow patterns by inducing fluid oscillation that enlarged differences between each flow pattern. Experiments with air–water mixtures were carried out in horizontal pipelines at ambient temperature and atmospheric pressure. Differential pressure signals from the bluff-body wake were obtained in bubble, bubble/plug transitional, plug, slug, and annular flows. Utilizing the adaptive ensemble empirical mode decomposition method and the Hilbert transform, the time–frequency entropy S of the differential pressure signals was obtained. By combining S and other flow parameters, such as the volumetric void fraction β, the dryness x, the ratio of density φ and the modified fluid coefficient ψ, a new flow pattern map was constructed which adopted S(1–x)φ and (1–β)ψ as the vertical and horizontal coordinates, respectively. The overall rate of classification of the map was verified to be 92.9% by the experimental data. It provides an effective and simple solution to the gas–liquid flow pattern identification problems.
文摘The idea of positional inverted index is exploited for indexing of graph database. The main idea is the use of hashing tables in order to prune a considerable portion of graph database that cannot contain the answer set. These tables are implemented using column-based techniques and are used to store graphs of database, frequent sub-graphs and the neighborhood of nodes. In order to exact checking of remaining graphs, the vertex invariant is used for isomorphism test which can be parallel implemented. The results of evaluation indicate that proposed method outperforms existing methods.