E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OS.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs.
Proceedings of the Security and Privacy in Communication Networks, 2018
Towards High-performance X25519/448 Key Agreement in General Purpose GPUs.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration.
IEEE Trans. Inf. Forensics Secur., 2017
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration.
Secur. Commun. Networks, 2017
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
High-Performance Symmetric Cryptography Server with GPU Acceleration.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Exploiting the Potential of GPUs for Modular Multiplication in ECC.
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Exploiting the Floating-Point Computing Power of GPUs for RSA.
Proceedings of the Information Security - 17th International Conference, 2014
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Improving Virtualization Security by Splitting Hypervisor into Smaller Components.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA.
Proceedings of the Information and Communications Security - 13th International Conference, 2011
An Efficient RSA Implementation without Precomputation.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011