Field programmable gate array applications—A scientometric review
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …
that can be configured by a customer after manufacturing to perform from a simple logic gate …
SPV: Secure path vector routing for securing BGP
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of
the underlying border gateway routing protocol (BGP) stands out as the Achilles heel …
the underlying border gateway routing protocol (BGP) stands out as the Achilles heel …
Accelerating fully homomorphic encryption using GPU
As a major breakthrough, in 2009 Gentry introduced the first plausible construction of a fully
homomorphic encryption (FHE) scheme. FHE allows the evaluation of arbitrary functions …
homomorphic encryption (FHE) scheme. FHE allows the evaluation of arbitrary functions …
Exploring the feasibility of fully homomorphic encryption
In 2010, Gentry and Halevi presented the first FHE implementation. FHE allows the
evaluation of arbitrary functions directly on encrypted data on untrusted servers. However …
evaluation of arbitrary functions directly on encrypted data on untrusted servers. However …
Systematic design of RSA processors based on high-radix Montgomery multipliers
A Miyamoto, N Homma, T Aoki… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
This paper presents a systematic design approach to provide the optimized Rivest-Shamir-
Adleman (RSA) processors based on high-radix Montgomery multipliers satisfying various …
Adleman (RSA) processors based on high-radix Montgomery multipliers satisfying various …
A new modular exponentiation architecture for efficient design of RSA cryptosystem
MD Shieh, JH Chen, HH Wu… - IEEE Transactions on Very …, 2008 - ieeexplore.ieee.org
Modular exponentiation with a large modulus, which is usually accomplished by repeated
modular multiplications, has been widely used in public key cryptosystems for secured data …
modular multiplications, has been widely used in public key cryptosystems for secured data …
Implementing homomorphic encryption based secure feedback control
This paper is about an encryption based approach to the secure implementation of feedback
controllers for physical systems. Specifically, Paillier's homomorphic encryption is used to …
controllers for physical systems. Specifically, Paillier's homomorphic encryption is used to …
PipeFL: Hardware/software co-design of an FPGA accelerator for federated learning
Z Wang, B Che, L Guo, Y Du, Y Chen, J Zhao… - IEEE Access, 2022 - ieeexplore.ieee.org
Federated learning has solved the problems of data silos and data fragmentation on the
premise of satisfying privacy. However, cryptographic algorithms in federated learning …
premise of satisfying privacy. However, cryptographic algorithms in federated learning …
The HEROIC framework: Encrypted computation without shared keys
NG Tsoutsos, M Maniatakos - IEEE Transactions on Computer …, 2015 - ieeexplore.ieee.org
Outsourcing computation to the cloud has recently become a very attractive option for
enterprises and consumers, due to mostly reduced cost and extensive scalability. At the …
enterprises and consumers, due to mostly reduced cost and extensive scalability. At the …
Making p2p accountable without losing privacy
Peer-to-peer systems have been proposed for a wide variety of applications, including file-
sharing, web caching, distributed computation, cooperative backup, and onion routing. An …
sharing, web caching, distributed computation, cooperative backup, and onion routing. An …