Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pei Du is active.

Publication


Featured researches published by Pei Du.


ubiquitous intelligence and computing | 2015

Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip

Xiang Wang; Liping Wang; Yuanchen Bai; Zhenxue He; Tao Wang; Bin Xu; He Zhang; Xiao-Cui Wang; Cheng Zhou; Weike Wang; Pei Du

This paper investigates the scalar multiplication algorithms of Elliptic Curve Cryptography (ECC) resisting power analysis attack in security System on Chip (SoC) and analyzes their efficiency. According to the characteristics of resource-constrained SoC, we compare and evaluate the average computation time complexity of different algorithms, and then propose an improved left to right Non-Adjacent Form (NAF) encoding algorithm (INAFEA). Furthermore, an improved scalar multiplication algorithm (ISMA) based on the INAFEA with the random signed binary code to call points operations is proposed, which can save a lot of chip area. Based on the work we have done, we proposed a new algorithm to preprocess the random key to make INAFEA more useful and built up an experimental encrypt system. The experimental results show that our proposed ISMA made the security SoC random power consumption, better efficiency and stronger ability to resist power analysis attack compared to the traditional scalar multiplication algorithm.


ieee international conference on green computing and communications | 2013

Iterative Threshold Selection for TOA Estimation of IR-UWB System

Xiang Wang; Bo Yin; Ying Lu; Bin Xu; Pei Du; Limin Xiao

A novel threshold selection technique is proposed in this paper to estimate the time of arrival (TOA) in impulse radio ultra-wide bandwidth (IR-UWB) systems. This technique can generate a threshold through an iterative process without any a-priori knowledge for the threshold-based TOA estimation. Monte Carlo simulations are used to confirm the validity of our threshold selection technique. The results show that the technique we propose is able to achieve comparable performance to a sub-optimal threshold comparison (TC) approach which needs perfect estimations of certain channel parameters.


Proceedings of the 2nd International Conference on Computer Science and Application Engineering - CSAE '18 | 2018

An Optimized Method of Hardware Implementation for LHash in the Embedded System

Xiang Wang; Yuntong Tian; Pei Du; Xiaobing Zhang; Weike Wang; Qiang Hao; Bing Xu; Zhun Zhang; Zongmin Zhao

The security1 of embedded systems has received much attention due to its widespread use and open application environment. Hash function is a commonly used solution to protect embedded system security. Due to the influence of area and power consumption, traditional hash encryption algorithms cannot be directly applied to embedded system because they consume too many resources. Therefore, lightweight encryption algorithms are receiving more and more attention. This paper proposes a method of applying LHash in embedded systems. The experimental results show that the method can correctly implement the LHash algorithm, and can simultaneously consider the area, power consumption and encryption speed, and has good applicability and security.


Iet Computers and Digital Techniques | 2018

Online learning based on a novel cost function for system power management

Xiang Wang; Lin Li; Weike Wang; Pei Du

A novel system power management technique is proposed that employs a novel cost function based on state-action. Compared with the conventional algorithm, by using multiple parameter constraints in cost function of power management framework, the improved Q-learning can effectively make decisions to achieve a rational optimisation room. The proposed power management framework does not need any prior data and is running on a power model. As uncertainties can be effectively captured and modelled, the framework based on the model can help to explore an ideal trade-off and converge to the best power management policy. The results obtained showed that improved algorithm achieved remarkable significance.


ubiquitous intelligence and computing | 2015

Hardware-Assisted Monitoring for Code Security in Embedded System

Xiang Wang; Quanneng Shen; Pei Du; Rong Zhang; Weike Wang; Lin Li; Bin Xu; Huihui Ji

This paper presents a novel hardware-assisted monitoring architecture for code protection. Program code can be considered as a number of basic code blocks, each with jump and return addresses. It records all possible positions and the function called address to extract the monitoring model of program. The compiler extracts the control flow and static code integrity validation information using lightweight hash and integrity algorithms at compile time. During the execution of the program security module reads from the specialized division of hardware such information, which is compared with the program generated in the process of real-time operation. If inconsistent with the description of the program was found, the security module will abort the CPU run. This design effectively improves the security of embedded systems, while the whole system costs less resource consumption and obtains high efficiency.


ubiquitous intelligence and computing | 2015

An Improved S-Box of Lightweight Hash Function SPOGENT

Xiang Wang; Pei Du; Quanneng Shen; Bin Xu; Lin Li; Weike Wang; Tongsheng Xia

The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by professionals, notably to implement cryptographic protocols in embedded system. Currently, SPONGENT is the most competitive lightweight hash function family. In this paper, we design a novel 4-bit S-box to improve the internal permutation of SPONGENT. The 4-bit S-box is designed by mathematical functions in finite fields. It includes power function as its core structure and outer affine transformation which has an involution matrix. Through calculating security indexes, it proves that the novel S-box has relatively high security levels as SPOGENT. Furthermore, the 4-bit S-box is very compact and has a smaller scale when implemented by hardware.


Journal of Universal Computer Science | 2018

A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems.

Xiang Wang; Weike Wang; Bin Xu; Pei Du; Lin Li; Muyang Liu


international conference on software engineering | 2017

A novel security validation in embedded system

Xiang Wang; Bin Xu; Weike Wang; Lin Li; Pei Du; Cheng Zhou; Mingzhe Li; Tongsheng Xia


MATEC Web of Conferences | 2018

Embedded System Confidentiality Protection by Cryptographic Engine Implemented with Composite Field Arithmetic

Weike Wang; Xiang Wang; Pei Du; Yuntong Tian; Xiaobing Zhang; Qiang Hao; Zhun Zhang; Bin Xu


IEICE Electronics Express | 2018

Hardware-assisted integrity monitor based on lightweight hash function

Pei Du; Xiang Wang; Weike Wang; Lin Li; Tongsheng Xia; Hongge Li

Collaboration


Dive into the Pei Du's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge