Pei Du
Beihang University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Pei Du.
ubiquitous intelligence and computing | 2015
Xiang Wang; Liping Wang; Yuanchen Bai; Zhenxue He; Tao Wang; Bin Xu; He Zhang; Xiao-Cui Wang; Cheng Zhou; Weike Wang; Pei Du
This paper investigates the scalar multiplication algorithms of Elliptic Curve Cryptography (ECC) resisting power analysis attack in security System on Chip (SoC) and analyzes their efficiency. According to the characteristics of resource-constrained SoC, we compare and evaluate the average computation time complexity of different algorithms, and then propose an improved left to right Non-Adjacent Form (NAF) encoding algorithm (INAFEA). Furthermore, an improved scalar multiplication algorithm (ISMA) based on the INAFEA with the random signed binary code to call points operations is proposed, which can save a lot of chip area. Based on the work we have done, we proposed a new algorithm to preprocess the random key to make INAFEA more useful and built up an experimental encrypt system. The experimental results show that our proposed ISMA made the security SoC random power consumption, better efficiency and stronger ability to resist power analysis attack compared to the traditional scalar multiplication algorithm.
ieee international conference on green computing and communications | 2013
Xiang Wang; Bo Yin; Ying Lu; Bin Xu; Pei Du; Limin Xiao
A novel threshold selection technique is proposed in this paper to estimate the time of arrival (TOA) in impulse radio ultra-wide bandwidth (IR-UWB) systems. This technique can generate a threshold through an iterative process without any a-priori knowledge for the threshold-based TOA estimation. Monte Carlo simulations are used to confirm the validity of our threshold selection technique. The results show that the technique we propose is able to achieve comparable performance to a sub-optimal threshold comparison (TC) approach which needs perfect estimations of certain channel parameters.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering - CSAE '18 | 2018
Xiang Wang; Yuntong Tian; Pei Du; Xiaobing Zhang; Weike Wang; Qiang Hao; Bing Xu; Zhun Zhang; Zongmin Zhao
The security1 of embedded systems has received much attention due to its widespread use and open application environment. Hash function is a commonly used solution to protect embedded system security. Due to the influence of area and power consumption, traditional hash encryption algorithms cannot be directly applied to embedded system because they consume too many resources. Therefore, lightweight encryption algorithms are receiving more and more attention. This paper proposes a method of applying LHash in embedded systems. The experimental results show that the method can correctly implement the LHash algorithm, and can simultaneously consider the area, power consumption and encryption speed, and has good applicability and security.
Iet Computers and Digital Techniques | 2018
Xiang Wang; Lin Li; Weike Wang; Pei Du
A novel system power management technique is proposed that employs a novel cost function based on state-action. Compared with the conventional algorithm, by using multiple parameter constraints in cost function of power management framework, the improved Q-learning can effectively make decisions to achieve a rational optimisation room. The proposed power management framework does not need any prior data and is running on a power model. As uncertainties can be effectively captured and modelled, the framework based on the model can help to explore an ideal trade-off and converge to the best power management policy. The results obtained showed that improved algorithm achieved remarkable significance.
ubiquitous intelligence and computing | 2015
Xiang Wang; Quanneng Shen; Pei Du; Rong Zhang; Weike Wang; Lin Li; Bin Xu; Huihui Ji
This paper presents a novel hardware-assisted monitoring architecture for code protection. Program code can be considered as a number of basic code blocks, each with jump and return addresses. It records all possible positions and the function called address to extract the monitoring model of program. The compiler extracts the control flow and static code integrity validation information using lightweight hash and integrity algorithms at compile time. During the execution of the program security module reads from the specialized division of hardware such information, which is compared with the program generated in the process of real-time operation. If inconsistent with the description of the program was found, the security module will abort the CPU run. This design effectively improves the security of embedded systems, while the whole system costs less resource consumption and obtains high efficiency.
ubiquitous intelligence and computing | 2015
Xiang Wang; Pei Du; Quanneng Shen; Bin Xu; Lin Li; Weike Wang; Tongsheng Xia
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by professionals, notably to implement cryptographic protocols in embedded system. Currently, SPONGENT is the most competitive lightweight hash function family. In this paper, we design a novel 4-bit S-box to improve the internal permutation of SPONGENT. The 4-bit S-box is designed by mathematical functions in finite fields. It includes power function as its core structure and outer affine transformation which has an involution matrix. Through calculating security indexes, it proves that the novel S-box has relatively high security levels as SPOGENT. Furthermore, the 4-bit S-box is very compact and has a smaller scale when implemented by hardware.
Journal of Universal Computer Science | 2018
Xiang Wang; Weike Wang; Bin Xu; Pei Du; Lin Li; Muyang Liu
international conference on software engineering | 2017
Xiang Wang; Bin Xu; Weike Wang; Lin Li; Pei Du; Cheng Zhou; Mingzhe Li; Tongsheng Xia
MATEC Web of Conferences | 2018
Weike Wang; Xiang Wang; Pei Du; Yuntong Tian; Xiaobing Zhang; Qiang Hao; Zhun Zhang; Bin Xu
IEICE Electronics Express | 2018
Pei Du; Xiang Wang; Weike Wang; Lin Li; Tongsheng Xia; Hongge Li