![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator
Public-key cryptography, including conventional cryptosystems and post-quantum cryptography, involves computation-intensive workloads. With noticing the extraordinary computing power of AI accelerators, in thi...
-
Chapter and Conference Paper
TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2
Driven by computer vision and autopilot industries, embedded graphics processing units (GPUs) are now rapidly achieving extraordinary computing power, such NVIDIA Tegra K1/X1/X2, which are widely used in embed...
-
Chapter and Conference Paper
TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator
In this paper, we exploit AI accelerator to implement cryptographic algorithms. To the best of our knowledge, it is the first attempt to implement quantum-safe Lattice-Based Cryptography (LBC) with AI accelera...
-
Chapter and Conference Paper
SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System
With the rise of IoT, e-commerce, and 5G, the demands of secure communications and identity authentications dramatically increase, which largely rely on high-volume cryptographic computing. Meanwhile, driven b...
-
Chapter and Conference Paper
Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation
Matrix inverse computation (MIC) is one of the fundamental mathematical tasks in linear algebra, and finds applications in many areas of science and engineering. In practice, MIC tasks often involve large-scal...
-
Chapter and Conference Paper
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to access all memory contents, therefore introduce great threats to plaintext sensitive data in memory. Register-based and ...