Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








133 Hits in 4.8 sec

Graphics Processing Units [chapter]

Peter Schwabe
2013 Secure Smart Embedded Devices, Platforms and Applications  
Then it highlights several applications of GPUs related to information security with a focus on applications in cryptography and cryptanalysis.  ...  This chapter first gives an introduction to the architectures of these modern GPUs and the tools and languages to program them.  ...  Also elliptic-curve cryptography has been implemented on GPUs.  ... 
doi:10.1007/978-1-4614-7915-4_8 fatcat:dg5zqkjdwrbn5ovruk3ib3jdh4

TensorCrypto: High Throughput Acceleration of Lattice-based Cryptography Using Tensor Core on GPU

Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seong Oun Hwang
2022 IEEE Access  
Experimental results show that the polynomial convolution computed using the tensor core is at least 2× faster than the version implemented with conventional integer units of the NVIDIA GPU.  ...  Considering that the IoT gateway devices and cloud servers need to handle massive connections from the sensor nodes, the proposed high throughput implementation on GPU is very useful in securing the IoT  ...  : integer factorization, discrete logarithm, or the elliptic-curve discrete logarithm.  ... 
doi:10.1109/access.2022.3152217 fatcat:b3zkaen3pbg2pf5evcmu3a6nx4

Efficient FPGA-based ECDSA Verification Engine for Permissioned Blockchains [article]

Rashmi Agrawal, Ji Yang, Haris Javaid
2021 arXiv   pre-print
In this paper, we propose an efficient implementation of ECDSA signature verification on an FPGA, in order to improve the performance of permissioned blockchains that aim to use FPGA-based hardware accelerators  ...  The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most commonly used cryptographic scheme in permissioned blockchains.  ...  Comparing elliptic curve cryptography and RSA on 8-bit CPUs.  ... 
arXiv:2112.02229v1 fatcat:r3bw4kn4tnhzvhh3cjqugnj65m

Accelerating Falcon Post-Quantum Digital Signature Algorithm on Graphic Processing Units

Seog Chung Seo, Sang Woo An, Dooho Choi
2023 Computers Materials & Continua  
Therefore, the proposed Falcon software can be used in servers managing multiple concurrent clients for efficient certificate verification and be used as an outsourced key generation and signature generation  ...  This study presents multiple methodologies to accelerate the performance of Falcon using graphics processing units (GPUs) for server-side use.  ...  Introduction Shor's algorithm [1] running on a quantum computer can break the current public key cryptosystems including Rivest-Shamir-Adleman (RSA), digital signature algorithm (DSA), and elliptic curve  ... 
doi:10.32604/cmc.2023.033910 fatcat:laep3d46breb3awzp3mp5i4zo4

An efficient ECC-based mechanism for securing network coding-based P2P content distribution

Heng He, Ruixuan Li, Zhiyong Xu, Weijun Xiao
2013 Peer-to-Peer Networking and Applications  
ESNC is mainly based on elliptic curve cryptography (ECC) and can provide high level of security.  ...  In this paper, we propose an efficient ECC-based mechanism for securing network coding-based P2P content distribution, namely ESNC, which includes an efficient network coding signature scheme and an identity-based  ...  That is, for encoded block e t , we have e t v T ¼ 0: Elliptic curve cryptography Elliptic curve cryptography (ECC) is a type of public key cryptography (PKC) based on elliptic curve theory [23] .  ... 
doi:10.1007/s12083-013-0239-x fatcat:6ma2ooczl5bohgzdowcyazxjqe

Efficient NewHope Cryptography Based Facial Security System on a GPU

Phap Duong-Ngoc, Tuy Nguyen Tan, Hanho Lee
2020 IEEE Access  
Duong-Ngoc et al.: Efficient NewHope Cryptography-Based Facial Security System on a GPU FIGURE 1. Post-quantum cryptography based facial security system.  ...  With explosive era of machine learning development, human data, such as biometric images, videos, and particularly facial information, have become an essential training resource.  ...  or Elliptic Curve Cryptography (ECC) algorithms [6] .  ... 
doi:10.1109/access.2020.3000316 fatcat:q65ylsrh25fvbedbdk77fduzy4

TensorCrypto [article]

Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seongoun Hwang
2021 IACR Cryptology ePrint Archive  
Tensor core is a specially designed hardware included in new NVIDIA GPU chips, aimed at accelerating deep learning applications.  ...  With the introduction of tensor core, the matrix multiplication at low precision can be computed much faster than using conventional integer and floating point units in NVIDIA GPU.  ...  Introduction The security of traditional Public Key Cryptography (PKC), such as RSA and ECC, relies on one of the three hard mathematical problems: integer factorization, discrete logarithm, or the elliptic-curve  ... 
dblp:journals/iacr/LeeSZH21 fatcat:jxxglxovu5gw3nnhgbqwl7ft64

A Hybrid-Cryptography Engine for Securing Intra-Vehicle Communications

Walter Tiberti, Roberto Civino, Norberto Gavioli, Marco Pugliese, Fortunato Santucci
2023 Applied Sciences  
the evolving trend of automotive industry, they also depict a growing size attack surface for malicious actors: the latter ones typically aim at exploiting known and unknown security vulnerabilities, with  ...  We tested the Crypto-Engine and demonstrated that, once configured according to application-defined performance requirements, it can authenticate parties and secure the communications with a negligible  ...  elliptic curve group.  ... 
doi:10.3390/app132413024 fatcat:fgmevqpjkbexfbxh7eyoft6ajy

The Role of Non-Positional Arithmetic on Efficient Emerging Cryptographic Algorithms

Paulo Martins, Leonel Sousa
2020 IEEE Access  
Examples of the methods and algorithms herein surveyed include subquadratic modular multiplication for isogeny-based cryptography, the acceleration of Goldreich-Goldwasser-Halevi (GGH) decryption by an  ...  The efficiency of public-key cryptography is strongly affected by the used number representations, as these systems are constructed from mathematically inspired problems to ensure security, and thus rely  ...  ELLIPTIC CURVE AND ISOGENY BASED CRYPTOGRAPHY ECC corresponds to the design of public-key cryptography based on the algebraic structure of Elliptic Curves (ECs) over finite fields.  ... 
doi:10.1109/access.2020.2983020 fatcat:52mmprnnz5gv5et3ps2v6a6vyy

Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units

SangWoo An, Seog Chung Seo
2020 Mathematics  
To efficiently use PQC in a server environment dealing with large amounts of data, optimization studies are required.  ...  For each algorithm, we present a part that can perform parallel processing of major operations with a large computational load using the characteristics of the GPU.  ...  However, with the advent of quantum computers, it has been suggested that modern cryptographic algorithms such as Rivest-Shamir-Adleman (RSA), elliptic curve cryptography (ECC), and the digital signature  ... 
doi:10.3390/math8101781 fatcat:visl2xkcynelzcngizoiqvyo6e

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

Bertrand Cambou, Michael Gowanlock, Bahattin Yildiz, Dina Ghanaimiandoab, Kaitlyn Lee, Stefan Nelson, Christopher Philabaum, Alyssa Stenberg, Jordan Wright
2021 Applied Sciences  
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers.  ...  The public and private cryptographic key pairs are computed from these seeds together with additional streams of random numbers.  ...  Rivest-Shamir-Adleman (RSA) and elliptic curve cryptography (ECC).  ... 
doi:10.3390/app11062801 fatcat:qiz5udgplzdzxj7o3gk3le56hq

Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

2018 Cryptography  
In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation  ...  This may be an advantage when designing security architectures for energy-restricted devices.  ...  , Digital Signature Algorithm (DSA), Diffie-Hellman (DH) key exchange, as well as Elliptic Curve Cryptography (ECC)  ... 
doi:10.3390/cryptography2010005 fatcat:dngahpmopbgtxonuawmwiiiuky

Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core

Anissa Sghaier, Medien Zeghid, Chiraz Massoud, Mohsen Mahchout
2017 Electronics  
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the analog to the Digital Signature Algorithm (DSA).  ...  This paper focuses on the hardware implementation of the ECDSA over elliptic curves with the 163-bit key length recommended by the NIST (National Institute of Standards and Technology).  ...  In 2014, a software optimization of elliptic curve cryptography with 256-bit prime fields was done in [11] .  ... 
doi:10.3390/electronics6020046 fatcat:6xav2duuwffmnhhhjqkjdumch4

NFLlib: NTT-Based Fast Lattice Library [chapter]

Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint
2016 Lecture Notes in Computer Science  
These implementations show performances competitive with (or even surpassing) those of currently used primitives such as RSA or elliptic curves (see e.g. [10, 31] ).  ...  Since this has no cost for the server we do not focus on which signature scheme is used.  ... 
doi:10.1007/978-3-319-29485-8_20 fatcat:el47i4l2vvbg7dheptw7dnl7yu

Efficient and Secure ECDSA Algorithm and its Applications: A Survey [article]

Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
2019 arXiv   pre-print
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been attracting attention from many researchers in different  ...  These algorithms heighten security against various attacks and at the same time improve performance to obtain efficiencies (time, memory, reduced computation complexity, and energy saving) in an environment  ...  Introduction Public key encryption algorithms such as elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been used extensively in many applications [1] especially  ... 
arXiv:1902.10313v1 fatcat:7k44pfghujbzdmoxpkynavzone
« Previous Showing results 1 — 15 out of 133 results