Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator

    Public-key cryptography, including conventional cryptosystems and post-quantum cryptography, involves computation-intensive workloads. With noticing the extraordinary computing power of AI accelerators, in thi...

    Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao in Computer Security – ESORICS 2022 (2022)

  2. No Access

    Chapter and Conference Paper

    SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System

    With the rise of IoT, e-commerce, and 5G, the demands of secure communications and identity authentications dramatically increase, which largely rely on high-volume cryptographic computing. Meanwhile, driven b...

    Guang Fan, Fangyu Zheng, Jiankuo Dong in Wireless Algorithms, Systems, and Applicat… (2021)

  3. No Access

    Chapter and Conference Paper

    Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure

    Online cipher is an important primitive in many cryptographic schemes, such as authenticated encryption schemes. Considering performance and security, the Hash-ECB-Hash (HEH) structure provides a potential way...

    Gang Liu, Peng Wang, Rong Wei, Dingfeng Ye in Information Security and Cryptology (2021)

  4. No Access

    Chapter and Conference Paper

    QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage

    To address the reliability and privacy concerns in cloud storage systems, we present a quasi-systematic erasure code with partial security, referred to as QS-code. As a new family of maximum distance separable...

    Chong Wang, Ke Zhou, Ronglei Wei in Cloud Computing and Security (2018)