Skip to main content

Page of 2 next disabled
and
  1. Chapter and Conference Paper

    RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks

    Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to access all memory contents, therefore introduce great threats to plaintext sensitive data in memory. Register-based and ...

    Yuan Zhao, **gqiang Lin, Wuqiong Pan in ICT Systems Security and Privacy Protection (2016)

  2. No Access

    Chapter and Conference Paper

    Exploiting the Potential of GPUs for Modular Multiplication in ECC

    In traditional multiple precision large integer multiplication algorithm, the required number of additions approximates the number of multiplications needed. In some platforms, the great number of add instruct...

    Fangyu Zheng, Wuqiong Pan, **gqiang Lin, Jiwu **g in Information Security Applications (2015)

  3. No Access

    Chapter and Conference Paper

    Exploiting the Floating-Point Computing Power of GPUs for RSA

    Asymmetric cryptographic algorithms (e.g., RSA and ECC) have been implemented on Graphics Processing Units (GPUs) for several years. These implementations mainly exploit the highly parallel GPU architecture an...

    Fangyu Zheng, Wuqiong Pan, **gqiang Lin, Jiwu **g, Yuan Zhao in Information Security (2014)

Page of 2 next disabled