Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Exploiting the Potential of GPUs for Modular Multiplication in ECC

    In traditional multiple precision large integer multiplication algorithm, the required number of additions approximates the number of multiplications needed. In some platforms, the great number of add instruct...

    Fangyu Zheng, Wuqiong Pan, **gqiang Lin, Jiwu **g in Information Security Applications (2015)

  2. Chapter and Conference Paper

    RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks

    Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to access all memory contents, therefore introduce great threats to plaintext sensitive data in memory. Register-based and ...

    Yuan Zhao, **gqiang Lin, Wuqiong Pan in ICT Systems Security and Privacy Protection (2016)

  3. Chapter and Conference Paper

    High-Performance Symmetric Cryptography Server with GPU Acceleration

    With more and more sensitive and private data transferred on the Internet, various security protocols have been developed to secure end-to-end communication. However, in practical situations, applying these pr...

    Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan in Information and Communications Security (2018)

  4. No Access

    Chapter and Conference Paper

    Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation

    Matrix inverse computation (MIC) is one of the fundamental mathematical tasks in linear algebra, and finds applications in many areas of science and engineering. In practice, MIC tasks often involve large-scal...

    Shiran Pan, Qiongxiao Wang, Fangyu Zheng in Wireless Algorithms, Systems, and Applicat… (2018)

  5. No Access

    Chapter and Conference Paper

    TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2

    Driven by computer vision and autopilot industries, embedded graphics processing units (GPUs) are now rapidly achieving extraordinary computing power, such NVIDIA Tegra K1/X1/X2, which are widely used in embed...

    Jiankuo Dong, Guang Fan, Fangyu Zheng in Wireless Algorithms, Systems, and Applicat… (2021)

  6. No Access

    Chapter and Conference Paper

    TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator

    In this paper, we exploit AI accelerator to implement cryptographic algorithms. To the best of our knowledge, it is the first attempt to implement quantum-safe Lattice-Based Cryptography (LBC) with AI accelera...

    Lipeng Wan, Fangyu Zheng, **gqiang Lin in Security and Privacy in Communication Networks (2021)

  7. No Access

    Chapter and Conference Paper

    SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System

    With the rise of IoT, e-commerce, and 5G, the demands of secure communications and identity authentications dramatically increase, which largely rely on high-volume cryptographic computing. Meanwhile, driven b...

    Guang Fan, Fangyu Zheng, Jiankuo Dong in Wireless Algorithms, Systems, and Applicat… (2021)

  8. No Access

    Chapter and Conference Paper

    MagicBatch: An Energy-Aware Scheduling Framework for DNN Inference on Heterogeneous Edge Servers in Space-Air-Ground Computation

    With the fast development of space-air-ground computing scenarios, large UAVs, airships or HAPS (high altitude platform station), and satellites, are in the trend to have more powerful computation resources (e...

    Di Liu, Zimo Ma, Aolin Zhang, Kuangyu Zheng in Big Data Intelligence and Computing (2023)

  9. No Access

    Chapter and Conference Paper

    SPath: An Energy-Efficient DAG Task Offloading Scheme with Space-Ground Cooperative Computing

    The fast improvement of satellites in both computation ability and numbers in the network, makes them possible to form as promising edge computing nodes for space-ground cooperative computing. These satellite ...

    Tianqi Zhao, Mingyue Zhao, Yue Shi, Kuangyu Zheng in Big Data Intelligence and Computing (2023)

  10. No Access

    Chapter and Conference Paper

    V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture

    Internet of Everything technology has greatly promoted the development of intelligent Internet of Vehicles (IoV) system. Similar to the Internet of Things system, the Internet of Vehicles also faces the proble...

    Qingguan Gao, Kaisheng Sun, Jiankuo Dong in Information Security and Cryptology (2024)

  11. No Access

    Chapter and Conference Paper

    JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications

    JSON Web Token (JWT) has been widely adopted to increase the security of authentication and authorization scenarios. However, how to manage the JWT key during its lifecycle is rarely mentioned in the standards...

    Bowen Xu, Shijie Jia, **gqiang Lin, Fangyu Zheng in Computer Security – ESORICS 2023 (2024)