Skip to main content

and
Your search also matched 18 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture

Include preview-only content
  1. Chapter and Conference Paper

    Software Service Recommendation Base on Collaborative Filtering Neural Network Model

    With broad application of Web service technology, many users look for applicable Web services to construct their target application quickly or do some further research. Github, as a treasury including a variet...

    Liang Chen, Angyu Zheng, Yinglan Feng, Fenfang **e in Service-Oriented Computing (2018)

  2. Chapter and Conference Paper

    High-Performance Symmetric Cryptography Server with GPU Acceleration

    With more and more sensitive and private data transferred on the Internet, various security protocols have been developed to secure end-to-end communication. However, in practical situations, applying these pr...

    Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan in Information and Communications Security (2018)

  3. Chapter and Conference Paper

    Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation

    Nowadays graphics processing units (GPUs) have become popular parallel computing platforms known as General-Purpose GPU (GPGPU) computing. GPUs thereby are chosen by some security researchers as cryptographic ...

    Ziyang Wang, Fangyu Zheng, **gqiang Lin in Information and Communications Security (2018)

  4. Chapter and Conference Paper

    PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA

    Efficient implementations of public-key cryptographic algorithms on general-purpose computing devices, facilitate the applications of cryptography in communication security. Existing solutions work in two diff...

    Yuan Zhao, Wuqiong Pan, **gqiang Lin in Selected Areas in Cryptography – SAC 2016 (2017)

  5. Chapter and Conference Paper

    RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks

    Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to access all memory contents, therefore introduce great threats to plaintext sensitive data in memory. Register-based and ...

    Yuan Zhao, **gqiang Lin, Wuqiong Pan in ICT Systems Security and Privacy Protection (2016)