Power analysis attacks are different from the traditional attacking mode. They can recover the secret keys stored in cryptographic hardware devices by analyzing the input and output data combining with cross-correlation between the operation instruction and the power consumption during the cipher processing. 功耗分析攻击突破传统密码算法的攻击模式,利用密码硬件设备工作过程中所产生的功耗与操作指令的相关性,结合输入和输出数据进行分析,获取电路内部保存的密钥。
Finally, makes the C code as input data, using the method of language transformation and pipelining technology introduced in this thesis to realize C code to VHDL code conversion and two pipelining ways ( the pipelining based instruction number and the pipelining based time). 最后,将C代码作为输入数据,应用本文的语言转换方法和流水处理方法实现了从C代码到VHDL代码转换和两种流水方式&依据串行指令条数进行流水和依据时间进行流水。
The fuzzy reasoning process with the neural network can gain the rule from the input/ output data using the network study or the cluster method, make the auto-adapted adjustment to the rule under the performance index instruction, and realize auto-study, auto-adaptation of the fuzzy system. 用神经网络实现模糊推理过程可采用网络学习或聚类的方法从输入输出数据中获取规则,然后在性能指标指导下,对规则进行自适应调整,从而实现模糊系统的自学习、自适应功能。