An efficient elliptic curve cryptography signature server with GPU acceleration

W Pan, F Zheng, Y Zhao, WT Zhu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Over the Internet, digital signature has been an indispensable approach to securing e-commerce
and other online transactions requiring authentication. Concerning the computing costs …

Improving virtualization security by splitting hypervisor into smaller components

W Pan, Y Zhang, M Yu, J Jing - Data and Applications Security and Privacy …, 2012 - Springer
In cloud computing, the security of infrastructure is determined by hypervisor (or Virtual
Machine Monitor, VMM) designs. Unfortunately, in recent years, many attacks have been …

A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over

Y Ma, Z Liu, W Pan, J Jing - International Conference on Selected Areas in …, 2013 - Springer
Elliptic curve cryptography (ECC) is preferred for high-speed applications due to the lower
computational complexity compared with other public-key cryptographic schemes. As the …

Evaluating optimized implementations of stream cipher ZUC algorithm on FPGA

L Wang, J Jing, Z Liu, L Zhang, W Pan - International Conference on …, 2011 - Springer
Compared with block ciphers, stream ciphers are more efficient when implemented in
hardware environment, like Field Programma-ble Gate Array (FPGA). In this paper, we propose …

Towards high-performance X25519/448 key agreement in general purpose GPUs

…, F Zheng, J Cheng, J Lin, W Pan… - 2018 IEEE Conference …, 2018 - ieeexplore.ieee.org
Widely used in a large range of Internet security protocols such as TLS/SSL, the key
exchange provides a method to establish a shared secret between two parties in unprotected …

Exploiting the floating-point computing power of GPUs for RSA

F Zheng, W Pan, J Lin, J Jing, Y Zhao - … Hong Kong, China, October 12-14 …, 2014 - Springer
Asymmetric cryptographic algorithms (eg, RSA and ECC) have been implemented on
Graphics Processing Units (GPUs) for several years. These implementations mainly exploit the …

Utilizing the Double‐Precision Floating‐Point Computing Power of GPUs for RSA Acceleration

J Dong, F Zheng, W Pan, J Lin, J Jing… - Security and …, 2017 - Wiley Online Library
Asymmetric cryptographic algorithm (eg, RSA and Elliptic Curve Cryptography) implementations
on Graphics Processing Units (GPUs) have been researched for over a decade. The …

Exploiting the potential of GPUs for modular multiplication in ECC

F Zheng, W Pan, J Lin, J Jing, Y Zhao - International Workshop on …, 2014 - Springer
In traditional multiple precision large integer multiplication algorithm, the required number of
additions approximates the number of multiplications needed. In some platforms, the great …

A new lightweight additive homomorphic encryption algorithm

W Pan, H Gu - arXiv preprint arXiv:2312.06987, 2023 - arxiv.org
This article describes a lightweight additive homomorphic algorithm with the same encryption
and decryption keys. Compared to standard additive homomorphic algorithms like Paillier, …

RegRSA: Using registers as buffers to resist memory disclosure attacks

Y Zhao, J Lin, W Pan, C Xue, F Zheng, Z Ma - … International Conference on …, 2016 - Springer
Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to
access all memory contents, therefore introduce great threats to plaintext sensitive data in …