Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator

    Public-key cryptography, including conventional cryptosystems and post-quantum cryptography, involves computation-intensive workloads. With noticing the extraordinary computing power of AI accelerators, in thi...

    Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao in Computer Security – ESORICS 2022 (2022)

  2. No Access

    Chapter and Conference Paper

    TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2

    Driven by computer vision and autopilot industries, embedded graphics processing units (GPUs) are now rapidly achieving extraordinary computing power, such NVIDIA Tegra K1/X1/X2, which are widely used in embed...

    Jiankuo Dong, Guang Fan, Fangyu Zheng in Wireless Algorithms, Systems, and Applicat… (2021)

  3. No Access

    Chapter and Conference Paper

    TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator

    In this paper, we exploit AI accelerator to implement cryptographic algorithms. To the best of our knowledge, it is the first attempt to implement quantum-safe Lattice-Based Cryptography (LBC) with AI accelera...

    Lipeng Wan, Fangyu Zheng, **gqiang Lin in Security and Privacy in Communication Networks (2021)

  4. No Access

    Chapter and Conference Paper

    SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System

    With the rise of IoT, e-commerce, and 5G, the demands of secure communications and identity authentications dramatically increase, which largely rely on high-volume cryptographic computing. Meanwhile, driven b...

    Guang Fan, Fangyu Zheng, Jiankuo Dong in Wireless Algorithms, Systems, and Applicat… (2021)

  5. No Access

    Article

    Incorporating geographical location for team formation in social coding sites

    With the proliferation of open source software and community, more and more developers from different background (e.g., culture, language, location, skill) prefer to work collaboratively and release their work...

    Liang Chen, Yongjian Ye, Angyu Zheng, Fenfang **e, Zibin Zheng in World Wide Web (2020)

  6. No Access

    Chapter and Conference Paper

    Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation

    Matrix inverse computation (MIC) is one of the fundamental mathematical tasks in linear algebra, and finds applications in many areas of science and engineering. In practice, MIC tasks often involve large-scal...

    Shiran Pan, Qiongxiao Wang, Fangyu Zheng in Wireless Algorithms, Systems, and Applicat… (2018)

  7. Chapter and Conference Paper

    RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks

    Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to access all memory contents, therefore introduce great threats to plaintext sensitive data in memory. Register-based and ...

    Yuan Zhao, **gqiang Lin, Wuqiong Pan in ICT Systems Security and Privacy Protection (2016)