Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications

    JSON Web Token (JWT) has been widely adopted to increase the security of authentication and authorization scenarios. However, how to manage the JWT key during its lifecycle is rarely mentioned in the standards...

    Bowen Xu, Shijie Jia, **gqiang Lin, Fangyu Zheng in Computer Security – ESORICS 2023 (2024)

  2. No Access

    Chapter and Conference Paper

    A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator

    Public-key cryptography, including conventional cryptosystems and post-quantum cryptography, involves computation-intensive workloads. With noticing the extraordinary computing power of AI accelerators, in thi...

    Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao in Computer Security – ESORICS 2022 (2022)

  3. No Access

    Chapter and Conference Paper

    TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2

    Driven by computer vision and autopilot industries, embedded graphics processing units (GPUs) are now rapidly achieving extraordinary computing power, such NVIDIA Tegra K1/X1/X2, which are widely used in embed...

    Jiankuo Dong, Guang Fan, Fangyu Zheng in Wireless Algorithms, Systems, and Applicat… (2021)

  4. No Access

    Chapter and Conference Paper

    SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System

    With the rise of IoT, e-commerce, and 5G, the demands of secure communications and identity authentications dramatically increase, which largely rely on high-volume cryptographic computing. Meanwhile, driven b...

    Guang Fan, Fangyu Zheng, Jiankuo Dong in Wireless Algorithms, Systems, and Applicat… (2021)

  5. Chapter and Conference Paper

    PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA

    Efficient implementations of public-key cryptographic algorithms on general-purpose computing devices, facilitate the applications of cryptography in communication security. Existing solutions work in two diff...

    Yuan Zhao, Wuqiong Pan, **gqiang Lin in Selected Areas in Cryptography – SAC 2016 (2017)