![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA
Efficient implementations of public-key cryptographic algorithms on general-purpose computing devices, facilitate the applications of cryptography in communication security. Existing solutions work in two diff...
-
Chapter and Conference Paper
TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2
Driven by computer vision and autopilot industries, embedded graphics processing units (GPUs) are now rapidly achieving extraordinary computing power, such NVIDIA Tegra K1/X1/X2, which are widely used in embed...
-
Chapter and Conference Paper
SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System
With the rise of IoT, e-commerce, and 5G, the demands of secure communications and identity authentications dramatically increase, which largely rely on high-volume cryptographic computing. Meanwhile, driven b...
-
Chapter and Conference Paper
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator
Public-key cryptography, including conventional cryptosystems and post-quantum cryptography, involves computation-intensive workloads. With noticing the extraordinary computing power of AI accelerators, in thi...
-
Chapter and Conference Paper
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications
JSON Web Token (JWT) has been widely adopted to increase the security of authentication and authorization scenarios. However, how to manage the JWT key during its lifecycle is rarely mentioned in the standards...