![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture
Internet of Everything technology has greatly promoted the development of intelligent Internet of Vehicles (IoV) system. Similar to the Internet of Things system, the Internet of Vehicles also faces the proble...
-
Chapter and Conference Paper
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications
JSON Web Token (JWT) has been widely adopted to increase the security of authentication and authorization scenarios. However, how to manage the JWT key during its lifecycle is rarely mentioned in the standards...
-
Chapter and Conference Paper
Protecting Private Keys of Dilithium Using Hardware Transactional Memory
The confidentiality of cryptography keys is necessary in cryptographic implementations. In order to resist memory disclosure attacks that steal sensitive variables such as private keys, various schemes are pro...
-
Chapter and Conference Paper
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA
Efficient implementations of public-key cryptographic algorithms on general-purpose computing devices, facilitate the applications of cryptography in communication security. Existing solutions work in two diff...
-
Chapter and Conference Paper
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to access all memory contents, therefore introduce great threats to plaintext sensitive data in memory. Register-based and ...
-
Chapter and Conference Paper
Exploiting the Potential of GPUs for Modular Multiplication in ECC
In traditional multiple precision large integer multiplication algorithm, the required number of additions approximates the number of multiplications needed. In some platforms, the great number of add instruct...
-
Chapter and Conference Paper
Exploiting the Floating-Point Computing Power of GPUs for RSA
Asymmetric cryptographic algorithms (e.g., RSA and ECC) have been implemented on Graphics Processing Units (GPUs) for several years. These implementations mainly exploit the highly parallel GPU architecture an...