A literature review on V2X communications security: Foundation, solutions, status, and future

Z Ying, K Wang, J Xiong, M Ma - IET Communications, 2024 - Wiley Online Library
With the refinement and development of the Vehicle to Everything (V2X) concept, its security
issues have gradually come to the fore, revealing many security risks and increasing …

A CUDA-based parallel optimization method for SM3 hash algorithm

J Han, T Peng, X Zhang - The Journal of Supercomputing, 2024 - Springer
Hash algorithms are among the most crucial algorithms in cryptography. The SM3 algorithm
is a hash cryptographic standard of China. Because of the strong collision resistance and …

[PDF][PDF] EG-STC: An Efficient Secure Two-Party Computation Scheme Based on Embedded GPU for Artificial Intelligence Systems.

Z Dong, X Ge, Y Huang, J Dong… - Computers, Materials & …, 2024 - cdn.techscience.cn
This paper presents a comprehensive exploration into the integration of Internet of Things
(IoT), big data analysis, cloud computing, and Artificial Intelligence (AI), which has led to an …

HETOCompiler: An MLIR-based crypTOgraphic Compilation Framework for HEterogeneous Devices

Z Tan, L Han, M Xing, Y Wu - arXiv preprint arXiv:2407.09333, 2024 - arxiv.org
Hash algorithms are fundamental tools in cryptography, offering irreversible and sensitive
transformations of input data for various security purposes. As computing architectures …