![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Exploiting the Floating-Point Computing Power of GPUs for RSA
Asymmetric cryptographic algorithms (e.g., RSA and ECC) have been implemented on Graphics Processing Units (GPUs) for several years. These implementations mainly exploit the highly parallel GPU architecture an...
-
Chapter and Conference Paper
Exploiting the Potential of GPUs for Modular Multiplication in ECC
In traditional multiple precision large integer multiplication algorithm, the required number of additions approximates the number of multiplications needed. In some platforms, the great number of add instruct...
-
Chapter and Conference Paper
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to access all memory contents, therefore introduce great threats to plaintext sensitive data in memory. Register-based and ...
-
Chapter and Conference Paper
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA
Efficient implementations of public-key cryptographic algorithms on general-purpose computing devices, facilitate the applications of cryptography in communication security. Existing solutions work in two diff...
-
Chapter and Conference Paper
Software Service Recommendation Base on Collaborative Filtering Neural Network Model
With broad application of Web service technology, many users look for applicable Web services to construct their target application quickly or do some further research. Github, as a treasury including a variet...
-
Chapter and Conference Paper
High-Performance Symmetric Cryptography Server with GPU Acceleration
With more and more sensitive and private data transferred on the Internet, various security protocols have been developed to secure end-to-end communication. However, in practical situations, applying these pr...
-
Chapter and Conference Paper
Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation
Matrix inverse computation (MIC) is one of the fundamental mathematical tasks in linear algebra, and finds applications in many areas of science and engineering. In practice, MIC tasks often involve large-scal...
-
Chapter and Conference Paper
Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs
When the public cloud provides infrastructure as a service (IaaS), the customer can outsource its data to the public cloud and release itself from the burden of storing data locally. At this point, the custome...
-
Chapter and Conference Paper
Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation
Nowadays graphics processing units (GPUs) have become popular parallel computing platforms known as General-Purpose GPU (GPGPU) computing. GPUs thereby are chosen by some security researchers as cryptographic ...
-
Article
Incorporating geographical location for team formation in social coding sites
With the proliferation of open source software and community, more and more developers from different background (e.g., culture, language, location, skill) prefer to work collaboratively and release their work...
-
Chapter and Conference Paper
Keep You from Leaving: Churn Prediction in Online Games
Customer retention is a crucial problem for game companies since the revenue is heavily influenced by the size of their user bases. Previous studies have reached a consensus that the cost of attracting a new p...
-
Article
Adaptive sliding mode control for high-order system with mismatched disturbances
-
Chapter and Conference Paper
TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2
Driven by computer vision and autopilot industries, embedded graphics processing units (GPUs) are now rapidly achieving extraordinary computing power, such NVIDIA Tegra K1/X1/X2, which are widely used in embed...
-
Chapter and Conference Paper
TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator
In this paper, we exploit AI accelerator to implement cryptographic algorithms. To the best of our knowledge, it is the first attempt to implement quantum-safe Lattice-Based Cryptography (LBC) with AI accelera...
-
Chapter and Conference Paper
SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System
With the rise of IoT, e-commerce, and 5G, the demands of secure communications and identity authentications dramatically increase, which largely rely on high-volume cryptographic computing. Meanwhile, driven b...
-
Chapter and Conference Paper
3D Point Cloud Map** Based on Intensity Feature
A 3D LIDAR simultaneous localization and map** scheme with intensity information corrected point clouds is proposed for the traditional simultaneous localization and map** (slam) methods. Four modules are ...
-
Chapter and Conference Paper
Black-Box Testing of Cryptographic Algorithms Based on Data Characteristics
Serving communications security, identity authentication, etc., cryptographic algorithms constitute the cornerstone of cyberspace security. During the past decades, cryptanalysts have proved that many once pre...
-
Chapter and Conference Paper
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator
Public-key cryptography, including conventional cryptosystems and post-quantum cryptography, involves computation-intensive workloads. With noticing the extraordinary computing power of AI accelerators, in thi...
-
Chapter and Conference Paper
MagicBatch: An Energy-Aware Scheduling Framework for DNN Inference on Heterogeneous Edge Servers in Space-Air-Ground Computation
With the fast development of space-air-ground computing scenarios, large UAVs, airships or HAPS (high altitude platform station), and satellites, are in the trend to have more powerful computation resources (e...
-
Chapter and Conference Paper
SPath: An Energy-Efficient DAG Task Offloading Scheme with Space-Ground Cooperative Computing
The fast improvement of satellites in both computation ability and numbers in the network, makes them possible to form as promising edge computing nodes for space-ground cooperative computing. These satellite ...