Field programmable gate array applications—A scientometric review

J Ruiz-Rosero, G Ramirez-Gonzalez, R Khanna - Computation, 2019 - mdpi.com
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …

SPV: Secure path vector routing for securing BGP

YC Hu, A Perrig, M Sirbu - Proceedings of the 2004 conference on …, 2004 - dl.acm.org
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of
the underlying border gateway routing protocol (BGP) stands out as the Achilles heel …

Accelerating fully homomorphic encryption using GPU

W Wang, Y Hu, L Chen, X Huang… - 2012 IEEE conference …, 2012 - ieeexplore.ieee.org
As a major breakthrough, in 2009 Gentry introduced the first plausible construction of a fully
homomorphic encryption (FHE) scheme. FHE allows the evaluation of arbitrary functions …

Exploring the feasibility of fully homomorphic encryption

W Wang, Y Hu, L Chen, X Huang… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In 2010, Gentry and Halevi presented the first FHE implementation. FHE allows the
evaluation of arbitrary functions directly on encrypted data on untrusted servers. However …

Systematic design of RSA processors based on high-radix Montgomery multipliers

A Miyamoto, N Homma, T Aoki… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
This paper presents a systematic design approach to provide the optimized Rivest-Shamir-
Adleman (RSA) processors based on high-radix Montgomery multipliers satisfying various …

A new modular exponentiation architecture for efficient design of RSA cryptosystem

MD Shieh, JH Chen, HH Wu… - IEEE Transactions on Very …, 2008 - ieeexplore.ieee.org
Modular exponentiation with a large modulus, which is usually accomplished by repeated
modular multiplications, has been widely used in public key cryptosystems for secured data …

Implementing homomorphic encryption based secure feedback control

J Tran, F Farokhi, M Cantoni, I Shames - Control Engineering Practice, 2020 - Elsevier
This paper is about an encryption based approach to the secure implementation of feedback
controllers for physical systems. Specifically, Paillier's homomorphic encryption is used to …

PipeFL: Hardware/software co-design of an FPGA accelerator for federated learning

Z Wang, B Che, L Guo, Y Du, Y Chen, J Zhao… - IEEE Access, 2022 - ieeexplore.ieee.org
Federated learning has solved the problems of data silos and data fragmentation on the
premise of satisfying privacy. However, cryptographic algorithms in federated learning …

The HEROIC framework: Encrypted computation without shared keys

NG Tsoutsos, M Maniatakos - IEEE Transactions on Computer …, 2015 - ieeexplore.ieee.org
Outsourcing computation to the cloud has recently become a very attractive option for
enterprises and consumers, due to mostly reduced cost and extensive scalability. At the …

Making p2p accountable without losing privacy

M Belenkiy, M Chase, CC Erway, J Jannotti… - Proceedings of the …, 2007 - dl.acm.org
Peer-to-peer systems have been proposed for a wide variety of applications, including file-
sharing, web caching, distributed computation, cooperative backup, and onion routing. An …