军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 HIGH PERFORMANCE相关记录18条 . 查询时间(0.149 秒)
Homomorphic encryption is a tool that enables computation on encrypted data and thus has applications in privacy-preserving cloud computing. Though conceptually amazing, implementation of homomorphic ...
Blocking microarchitectural (digital) side channels is one of the most pressing challenges in hardware security today. Recently, there has been a surge of effort that attempts to block these leakages ...
FPGA Cluster based high performance Cryptanalysis framework     FPGA cluster  CPUs       font style='font-size:12px;'> 2018/7/9
In this paper a ‘FPGA cluster’ based framework for high performance Cryptanalysis has been proposed. The framework abstracts underlying networked FPGA cluster into a unified acceleration resource. It ...
To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptography available in the literature. Particularly, we present the first implementation of the supersin...
Authenticated encryption (AE) has recently gained renewed interest due to the ongoing CAESAR competition. This paper deals with the performance of block cipher modes of operation for AE in parallel ...
Many lattice-based signature schemes have been proposed in recent years. However, all of them suffer from huge signature sizes as compared to their classical counterparts. We present a novel and gene...
Lattice-based cryptography became a hot-topic in the past years because it seems to be quantum immune, i.e., resistant to attacks operated with quantum computers. The security of lattice-based cryptos...
The parallel algorithm and its implementation for performing a single-block collision attack on MD5 are described. The algorithm is implemented as MPI program based upon the source code of Dr Marc S...
Lattice-based encryption schemes still suffer from a low message throughput per ciphertext. This is mainly due to the fact that the underlying schemes do not tap the full potentials of LWE. Many cons...
High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers     Ideal lattices  NTT  RLWE       font style='font-size:12px;'> 2015/12/31
Over the last years lattice-based cryptography has received much attention due to versatile average-case problems like Ring-LWE or Ring-SIS that appear to be intractable by quantum computers. But de...
We present a unified view of the two-party and multi-party computation protocols based on oblivious transfer first outlined in Nielsen et al and Larraia et al. We present a number of modi- fications...
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition     GLV  GLS  Genus 2       font style='font-size:12px;'> 2013/4/18
This paper explores the potential for using genus~2 curves over quadratic extension fields in cryptography, motivated by the fact that they allow for an 8-dimensional scalar decomposition when using a...
We have implemented in FPGA recently published class of public key algorithms MQQ, that are based on quasigroup string transformations. Our implementation achieves decryption throughput of 399 Mbps o...
We propose a new architecture for performing Elliptic Curve Scalar Multiplication (ECSM) on elliptic curves over GF(2m). This architecture maximizes the parallelism that the projective version of the...
High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...