![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to access all memory contents, therefore introduce great threats to plaintext sensitive data in memory. Register-based and ...
-
Chapter and Conference Paper
Exploiting the Potential of GPUs for Modular Multiplication in ECC
In traditional multiple precision large integer multiplication algorithm, the required number of additions approximates the number of multiplications needed. In some platforms, the great number of add instruct...
-
Chapter and Conference Paper
Exploiting the Floating-Point Computing Power of GPUs for RSA
Asymmetric cryptographic algorithms (e.g., RSA and ECC) have been implemented on Graphics Processing Units (GPUs) for several years. These implementations mainly exploit the highly parallel GPU architecture an...