Efficient implementation of AES-CTR and AES-ECB on GPUs with applications for high-speed FrodoKEM and exhaustive key search
The Advanced Encryption Standard (AES) is a standardized block cipher widely used to
protect data confidentiality. Besides that, it can be used to generate pseudo-random …
protect data confidentiality. Besides that, it can be used to generate pseudo-random …
High throughput implementation of post-quantum key encapsulation and decapsulation on GPU for Internet of Things applications
Internet of Things (IoT) sensor nodes are placed ubiquitously to collect information, which is
then vulnerable to malicious attacks. For instance, adversaries can perform side channel …
then vulnerable to malicious attacks. For instance, adversaries can perform side channel …
Ensuring the security and performance of IoT communication by improving encryption and decryption with the lightweight cipher uBlock
Internet of Things (IoT) devices expect a secure communication method or protocol with
communication performance that matches the network bandwidth in a public network. With …
communication performance that matches the network bandwidth in a public network. With …
DPCrypto: Acceleration of post-quantum cryptography using dot-product instructions on GPUs
Modern NVIDIA GPU architectures offer dot-product instructions (DP2A and DP4A), with the
aim of accelerating machine learning and scientific computing applications. These dot …
aim of accelerating machine learning and scientific computing applications. These dot …
Accelerating DES and AES algorithms for a heterogeneous many-core processor
B Xing, DD Wang, Y Yang, Z Wei, J Wu… - International Journal of …, 2021 - Springer
Data security is the focus of information security. As a primary method, file encryption is
adopted for ensuring data security. Encryption algorithms created to meet the Data …
adopted for ensuring data security. Encryption algorithms created to meet the Data …
Efficient GPU implementations of post-quantum signature XMSS
Z Wang, X Dong, H Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The National Institute of Standards and Technology (NIST) approved XMSS as part of the
post-quantum cryptography (PQC) development effort in 2018. XMSS is currently one of only …
post-quantum cryptography (PQC) development effort in 2018. XMSS is currently one of only …
Designing a new XTS-AES parallel optimization implementation technique for fast file encryption
S An, SC Seo - IEEE Access, 2022 - ieeexplore.ieee.org
XTS-AES is a disk encryption mode of operation that uses the block cipher AES. Several
studies have been conducted to improve the encryption speed using XTS-AES according to …
studies have been conducted to improve the encryption speed using XTS-AES according to …
A novel single kernel parallel image encryption scheme based on a chaotic map
JIM Bezerra, A Molter, G Machado, RI Soares… - Journal of Real-Time …, 2024 - Springer
The development of communication technologies has increased concerns about data
security, increasing the prominence of cryptography. Images are one of the most widely …
security, increasing the prominence of cryptography. Images are one of the most widely …
Low Latency and High Throughput Pipelined Online Adder for Streaming Inner Product
Low latency computation is vital to meet real-time constraints in many Convolutional Neural
Networks (CNN) based applications such as autonomous vehicles. To enable low latency …
Networks (CNN) based applications such as autonomous vehicles. To enable low latency …
A two-layer IP hopping-based moving target defense approach to enhancing the security of mobile ad-hoc networks
P Wang, M Zhou, Z Ding - Sensors, 2021 - mdpi.com
Mobile ad-hoc networks (MANETs) have great potential applications in military missions or
emergency rescue due to their no-infrastructure, self-organizing and multi hop capability …
emergency rescue due to their no-infrastructure, self-organizing and multi hop capability …