A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Graphics Processing Units
[chapter]
2013
Secure Smart Embedded Devices, Platforms and Applications
Then it highlights several applications of GPUs related to information security with a focus on applications in cryptography and cryptanalysis. ...
This chapter first gives an introduction to the architectures of these modern GPUs and the tools and languages to program them. ...
Also elliptic-curve cryptography has been implemented on GPUs. ...
doi:10.1007/978-1-4614-7915-4_8
fatcat:dg5zqkjdwrbn5ovruk3ib3jdh4
TensorCrypto: High Throughput Acceleration of Lattice-based Cryptography Using Tensor Core on GPU
2022
IEEE Access
Experimental results show that the polynomial convolution computed using the tensor core is at least 2× faster than the version implemented with conventional integer units of the NVIDIA GPU. ...
Considering that the IoT gateway devices and cloud servers need to handle massive connections from the sensor nodes, the proposed high throughput implementation on GPU is very useful in securing the IoT ...
: integer factorization, discrete logarithm, or the elliptic-curve discrete logarithm. ...
doi:10.1109/access.2022.3152217
fatcat:b3zkaen3pbg2pf5evcmu3a6nx4
Efficient FPGA-based ECDSA Verification Engine for Permissioned Blockchains
[article]
2021
arXiv
pre-print
In this paper, we propose an efficient implementation of ECDSA signature verification on an FPGA, in order to improve the performance of permissioned blockchains that aim to use FPGA-based hardware accelerators ...
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most commonly used cryptographic scheme in permissioned blockchains. ...
Comparing elliptic curve cryptography and RSA on 8-bit CPUs. ...
arXiv:2112.02229v1
fatcat:r3bw4kn4tnhzvhh3cjqugnj65m
Accelerating Falcon Post-Quantum Digital Signature Algorithm on Graphic Processing Units
2023
Computers Materials & Continua
Therefore, the proposed Falcon software can be used in servers managing multiple concurrent clients for efficient certificate verification and be used as an outsourced key generation and signature generation ...
This study presents multiple methodologies to accelerate the performance of Falcon using graphics processing units (GPUs) for server-side use. ...
Introduction Shor's algorithm [1] running on a quantum computer can break the current public key cryptosystems including Rivest-Shamir-Adleman (RSA), digital signature algorithm (DSA), and elliptic curve ...
doi:10.32604/cmc.2023.033910
fatcat:laep3d46breb3awzp3mp5i4zo4
An efficient ECC-based mechanism for securing network coding-based P2P content distribution
2013
Peer-to-Peer Networking and Applications
ESNC is mainly based on elliptic curve cryptography (ECC) and can provide high level of security. ...
In this paper, we propose an efficient ECC-based mechanism for securing network coding-based P2P content distribution, namely ESNC, which includes an efficient network coding signature scheme and an identity-based ...
That is, for encoded block e t , we have e t v T ¼ 0:
Elliptic curve cryptography Elliptic curve cryptography (ECC) is a type of public key cryptography (PKC) based on elliptic curve theory [23] . ...
doi:10.1007/s12083-013-0239-x
fatcat:6ma2ooczl5bohgzdowcyazxjqe
Efficient NewHope Cryptography Based Facial Security System on a GPU
2020
IEEE Access
Duong-Ngoc et al.: Efficient NewHope Cryptography-Based Facial Security System on a GPU FIGURE 1. Post-quantum cryptography based facial security system. ...
With explosive era of machine learning development, human data, such as biometric images, videos, and particularly facial information, have become an essential training resource. ...
or Elliptic Curve Cryptography (ECC) algorithms [6] . ...
doi:10.1109/access.2020.3000316
fatcat:q65ylsrh25fvbedbdk77fduzy4
TensorCrypto
[article]
2021
IACR Cryptology ePrint Archive
Tensor core is a specially designed hardware included in new NVIDIA GPU chips, aimed at accelerating deep learning applications. ...
With the introduction of tensor core, the matrix multiplication at low precision can be computed much faster than using conventional integer and floating point units in NVIDIA GPU. ...
Introduction The security of traditional Public Key Cryptography (PKC), such as RSA and ECC, relies on one of the three hard mathematical problems: integer factorization, discrete logarithm, or the elliptic-curve ...
dblp:journals/iacr/LeeSZH21
fatcat:jxxglxovu5gw3nnhgbqwl7ft64
A Hybrid-Cryptography Engine for Securing Intra-Vehicle Communications
2023
Applied Sciences
the evolving trend of automotive industry, they also depict a growing size attack surface for malicious actors: the latter ones typically aim at exploiting known and unknown security vulnerabilities, with ...
We tested the Crypto-Engine and demonstrated that, once configured according to application-defined performance requirements, it can authenticate parties and secure the communications with a negligible ...
elliptic curve group. ...
doi:10.3390/app132413024
fatcat:fgmevqpjkbexfbxh7eyoft6ajy
The Role of Non-Positional Arithmetic on Efficient Emerging Cryptographic Algorithms
2020
IEEE Access
Examples of the methods and algorithms herein surveyed include subquadratic modular multiplication for isogeny-based cryptography, the acceleration of Goldreich-Goldwasser-Halevi (GGH) decryption by an ...
The efficiency of public-key cryptography is strongly affected by the used number representations, as these systems are constructed from mathematically inspired problems to ensure security, and thus rely ...
ELLIPTIC CURVE AND ISOGENY BASED CRYPTOGRAPHY ECC corresponds to the design of public-key cryptography based on the algebraic structure of Elliptic Curves (ECs) over finite fields. ...
doi:10.1109/access.2020.2983020
fatcat:52mmprnnz5gv5et3ps2v6a6vyy
Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units
2020
Mathematics
To efficiently use PQC in a server environment dealing with large amounts of data, optimization studies are required. ...
For each algorithm, we present a part that can perform parallel processing of major operations with a large computational load using the characteristics of the GPU. ...
However, with the advent of quantum computers, it has been suggested that modern cryptographic algorithms such as Rivest-Shamir-Adleman (RSA), elliptic curve cryptography (ECC), and the digital signature ...
doi:10.3390/math8101781
fatcat:visl2xkcynelzcngizoiqvyo6e
Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
2021
Applied Sciences
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. ...
The public and private cryptographic key pairs are computed from these seeds together with additional streams of random numbers. ...
Rivest-Shamir-Adleman (RSA) and elliptic curve cryptography (ECC). ...
doi:10.3390/app11062801
fatcat:qiz5udgplzdzxj7o3gk3le56hq
Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
2018
Cryptography
In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation ...
This may be an advantage when designing security architectures for energy-restricted devices. ...
, Digital Signature Algorithm (DSA), Diffie-Hellman (DH) key exchange, as well as Elliptic Curve Cryptography (ECC) ...
doi:10.3390/cryptography2010005
fatcat:dngahpmopbgtxonuawmwiiiuky
Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core
2017
Electronics
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the analog to the Digital Signature Algorithm (DSA). ...
This paper focuses on the hardware implementation of the ECDSA over elliptic curves with the 163-bit key length recommended by the NIST (National Institute of Standards and Technology). ...
In 2014, a software optimization of elliptic curve cryptography with 256-bit prime fields was done in [11] . ...
doi:10.3390/electronics6020046
fatcat:6xav2duuwffmnhhhjqkjdumch4
NFLlib: NTT-Based Fast Lattice Library
[chapter]
2016
Lecture Notes in Computer Science
These implementations show performances competitive with (or even surpassing) those of currently used primitives such as RSA or elliptic curves (see e.g. [10, 31] ). ...
Since this has no cost for the server we do not focus on which signature scheme is used. ...
doi:10.1007/978-3-319-29485-8_20
fatcat:el47i4l2vvbg7dheptw7dnl7yu
Efficient and Secure ECDSA Algorithm and its Applications: A Survey
[article]
2019
arXiv
pre-print
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been attracting attention from many researchers in different ...
These algorithms heighten security against various attacks and at the same time improve performance to obtain efficiencies (time, memory, reduced computation complexity, and energy saving) in an environment ...
Introduction Public key encryption algorithms such as elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been used extensively in many applications [1] especially ...
arXiv:1902.10313v1
fatcat:7k44pfghujbzdmoxpkynavzone
« Previous
Showing results 1 — 15 out of 133 results