An efficient elliptic curve cryptography signature server with GPU acceleration
W Pan, F Zheng, Y Zhao, WT Zhu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Over the Internet, digital signature has been an indispensable approach to securing e-commerce
and other online transactions requiring authentication. Concerning the computing costs …
and other online transactions requiring authentication. Concerning the computing costs …
Improving virtualization security by splitting hypervisor into smaller components
In cloud computing, the security of infrastructure is determined by hypervisor (or Virtual
Machine Monitor, VMM) designs. Unfortunately, in recent years, many attacks have been …
Machine Monitor, VMM) designs. Unfortunately, in recent years, many attacks have been …
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over
Y Ma, Z Liu, W Pan, J Jing - International Conference on Selected Areas in …, 2013 - Springer
Elliptic curve cryptography (ECC) is preferred for high-speed applications due to the lower
computational complexity compared with other public-key cryptographic schemes. As the …
computational complexity compared with other public-key cryptographic schemes. As the …
Evaluating optimized implementations of stream cipher ZUC algorithm on FPGA
L Wang, J Jing, Z Liu, L Zhang, W Pan - International Conference on …, 2011 - Springer
Compared with block ciphers, stream ciphers are more efficient when implemented in
hardware environment, like Field Programma-ble Gate Array (FPGA). In this paper, we propose …
hardware environment, like Field Programma-ble Gate Array (FPGA). In this paper, we propose …
Towards high-performance X25519/448 key agreement in general purpose GPUs
Widely used in a large range of Internet security protocols such as TLS/SSL, the key
exchange provides a method to establish a shared secret between two parties in unprotected …
exchange provides a method to establish a shared secret between two parties in unprotected …
Exploiting the floating-point computing power of GPUs for RSA
Asymmetric cryptographic algorithms (eg, RSA and ECC) have been implemented on
Graphics Processing Units (GPUs) for several years. These implementations mainly exploit the …
Graphics Processing Units (GPUs) for several years. These implementations mainly exploit the …
Utilizing the Double‐Precision Floating‐Point Computing Power of GPUs for RSA Acceleration
Asymmetric cryptographic algorithm (eg, RSA and Elliptic Curve Cryptography) implementations
on Graphics Processing Units (GPUs) have been researched for over a decade. The …
on Graphics Processing Units (GPUs) have been researched for over a decade. The …
Exploiting the potential of GPUs for modular multiplication in ECC
In traditional multiple precision large integer multiplication algorithm, the required number of
additions approximates the number of multiplications needed. In some platforms, the great …
additions approximates the number of multiplications needed. In some platforms, the great …
A new lightweight additive homomorphic encryption algorithm
W Pan, H Gu - arXiv preprint arXiv:2312.06987, 2023 - arxiv.org
This article describes a lightweight additive homomorphic algorithm with the same encryption
and decryption keys. Compared to standard additive homomorphic algorithms like Paillier, …
and decryption keys. Compared to standard additive homomorphic algorithms like Paillier, …
RegRSA: Using registers as buffers to resist memory disclosure attacks
Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to
access all memory contents, therefore introduce great threats to plaintext sensitive data in …
access all memory contents, therefore introduce great threats to plaintext sensitive data in …