搜索结果: 1-15 共查到“军事学 HIGH PERFORMANCE”相关记录18条 . 查询时间(0.149 秒)
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data
FV homomorphic encryption latticebased cryptography polynomial multiplication
font style='font-size:12px;'>
2019/2/25
Homomorphic encryption is a tool that enables computation on encrypted data and thus has applications in privacy-preserving cloud computing. Though conceptually amazing, implementation of homomorphic ...
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing
Data oblivious computing constant time computing secure hardware
font style='font-size:12px;'>
2018/11/19
Blocking microarchitectural (digital) side channels is one of the most pressing challenges in hardware security today. Recently, there has been a surge of effort that attempts to block these leakages ...
FPGA Cluster based high performance Cryptanalysis framework
FPGA cluster CPUs
font style='font-size:12px;'>
2018/7/9
In this paper a ‘FPGA cluster’ based framework for high performance Cryptanalysis has been proposed. The framework abstracts underlying networked FPGA cluster into a unified acceleration resource. It ...
FPGA-SIDH: High-Performance Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on FPGA
Post-quantum cryptography elliptic curve cryptography (ECC) isogeny-based cryptography
font style='font-size:12px;'>
2016/7/7
To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptography available in the
literature. Particularly, we present the first implementation of the supersin...
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
Authenticated encryption AES-NI pclmulqdq
font style='font-size:12px;'>
2016/1/25
Authenticated encryption (AE) has recently gained renewed interest due to the
ongoing CAESAR competition. This paper deals with the performance of block cipher modes
of operation for AE in parallel ...
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures
Lattice-Based Cryptography Lattice-Based Signatures
font style='font-size:12px;'>
2016/1/9
Many lattice-based signature schemes have been proposed in recent years. However, all of them
suffer from huge signature sizes as compared to their classical counterparts. We present a novel and gene...
Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation
Linear Speedups High Performance Computing
font style='font-size:12px;'>
2016/1/7
Lattice-based cryptography became a hot-topic in the past years because it seems to be quantum immune, i.e., resistant to attacks operated with quantum computers. The security of lattice-based cryptos...
An algorithm for MD5 single-block collision attack using high-performance computing cluster
hash functions MD5 computing cluster
font style='font-size:12px;'>
2016/1/6
The parallel algorithm and its implementation for performing a single-block collision attack on
MD5 are described. The algorithm is implemented as MPI program based upon the source code of Dr Marc
S...
High Performance Lattice-based CCA-secure Encryption
Lattice-Based Cryptography Encryption Scheme Lattice-Based Assumptions
font style='font-size:12px;'>
2016/1/4
Lattice-based encryption schemes still suffer from a low message throughput per ciphertext. This is mainly
due to the fact that the underlying schemes do not tap the full potentials of LWE. Many cons...
High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers
Ideal lattices NTT RLWE
font style='font-size:12px;'>
2015/12/31
Over the last years lattice-based cryptography has received much attention due to versatile
average-case problems like Ring-LWE or Ring-SIS that appear to be intractable by quantum computers.
But de...
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer
Binary Circuits Oblivious Transfer
font style='font-size:12px;'>
2015/12/30
We present a unified view of the two-party and multi-party computation protocols based
on oblivious transfer first outlined in Nielsen et al and Larraia et al. We present a number of modi-
fications...
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
GLV GLS Genus 2
font style='font-size:12px;'>
2013/4/18
This paper explores the potential for using genus~2 curves over quadratic extension fields in cryptography, motivated by the fact that they allow for an 8-dimensional scalar decomposition when using a...
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms
Ultra Fast Public Key Cryptosystems Multivariate Quadratic Quasigroup MQQ
font style='font-size:12px;'>
2009/6/5
We have implemented in FPGA recently published class of public key algorithms MQQ, that are based on quasigroup string transformations. Our implementation achieves decryption
throughput of 399 Mbps o...
High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2m)
Elliptic Curve Cryptography Elliptic Curve Scalar Multiplication FPGA
font style='font-size:12px;'>
2009/6/2
We propose a new architecture for performing Elliptic Curve Scalar Multiplication (ECSM) on elliptic curves over
GF(2m). This architecture maximizes the parallelism that the projective version of the...
High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two
High Performance Arithmetic Hyperelliptic Curve Cryptosystems Genus Two
font style='font-size:12px;'>
2009/4/10
High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two.