Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture

    Internet of Everything technology has greatly promoted the development of intelligent Internet of Vehicles (IoV) system. Similar to the Internet of Things system, the Internet of Vehicles also faces the proble...

    Qingguan Gao, Kaisheng Sun, Jiankuo Dong in Information Security and Cryptology (2024)

  2. No Access

    Chapter and Conference Paper

    JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications

    JSON Web Token (JWT) has been widely adopted to increase the security of authentication and authorization scenarios. However, how to manage the JWT key during its lifecycle is rarely mentioned in the standards...

    Bowen Xu, Shijie Jia, **gqiang Lin, Fangyu Zheng in Computer Security – ESORICS 2023 (2024)

  3. No Access

    Chapter and Conference Paper

    Protecting Private Keys of Dilithium Using Hardware Transactional Memory

    The confidentiality of cryptography keys is necessary in cryptographic implementations. In order to resist memory disclosure attacks that steal sensitive variables such as private keys, various schemes are pro...

    Lingjia Meng, Yu Fu, Fangyu Zheng, Ziqiang Ma, Mingyu Wang in Information Security (2023)

  4. Chapter and Conference Paper

    PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA

    Efficient implementations of public-key cryptographic algorithms on general-purpose computing devices, facilitate the applications of cryptography in communication security. Existing solutions work in two diff...

    Yuan Zhao, Wuqiong Pan, **gqiang Lin in Selected Areas in Cryptography – SAC 2016 (2017)

  5. Chapter and Conference Paper

    RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks

    Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to access all memory contents, therefore introduce great threats to plaintext sensitive data in memory. Register-based and ...

    Yuan Zhao, **gqiang Lin, Wuqiong Pan in ICT Systems Security and Privacy Protection (2016)

  6. No Access

    Chapter and Conference Paper

    Exploiting the Potential of GPUs for Modular Multiplication in ECC

    In traditional multiple precision large integer multiplication algorithm, the required number of additions approximates the number of multiplications needed. In some platforms, the great number of add instruct...

    Fangyu Zheng, Wuqiong Pan, **gqiang Lin, Jiwu **g in Information Security Applications (2015)

  7. No Access

    Chapter and Conference Paper

    Exploiting the Floating-Point Computing Power of GPUs for RSA

    Asymmetric cryptographic algorithms (e.g., RSA and ECC) have been implemented on Graphics Processing Units (GPUs) for several years. These implementations mainly exploit the highly parallel GPU architecture an...

    Fangyu Zheng, Wuqiong Pan, **gqiang Lin, Jiwu **g, Yuan Zhao in Information Security (2014)