搜索结果: 1-15 共查到“密码学 GPU”相关记录19条 . 查询时间(0.095 秒)
How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation
MBFFA AES Implementation
2018/11/12
Parallel cryptographic implementations are generally considered to be more advantageous than their non-parallel counterparts in mitigating side-channel attacks because of their higher noise-level. So ...
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
side-channel cache attacks
2018/6/25
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to create a Trusted Execution Environment (TEE) called a Secure World, which runs secure processes (Trust...
SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic Encryption Scheme
Homomorphic Encryption FHE NTRU
2016/5/9
Sharing the medical records of individuals among healthcare providers and researchers around the world can accelerate advances in medical research. While the idea seems increasingly practical due to c...
Faster Maliciously Secure Two-Party Computation Using the GPU
cryptographic protocols implementation secure two-party computation
2016/1/23
We present a new protocol for maliciously secure two-party computation based on cut-and-choose of garbled circuits using the recent idea of “forge-and-loose”, which eliminates around a factor 3 of ga...
We present here optimized implementations of the MAKWA password hashing
function on an AMD Radeon HD 7990 GPU, and compare its efficency with an Intel
i7 4770K CPU for systematic dictionary attacks....
Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture
applications secure multi-party computing
2013/4/18
This paper presents privacy-preserving, parallel computing algorithms on a graphic processing unit (GPU) architecture to solve the Edit-Distance (ED) and the Smith-Waterman (SW) problems. The ED and S...
Fast and Maliciously Secure Two-Party Computation Using the GPU
cryptographic protocols implementation two-party computation
2013/2/21
We describe, and implement, a maliciously secure protocol for secure two-party computation, based on Yao's garbled circuit and an efficient OT extension, in a parallel computational model. The impleme...
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
secret-key cryptography / CUDA eSTREAM GPU HC-128 HC-256 stream cipher
2013/2/21
The ease of programming offered by the CUDA programming model attracted a lot of programmers to try the platform for acceleration of many non-graphics applications. Cryptography, being no exception, a...
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
AES Cryptanalysis Cryptanalytic Hardware
2012/6/14
The block cipher Rijndael has undergone more than ten years of extensive cryptanalysis since its submission as a candidate for the Advanced Encryption Standard (AES) in April 1998. To date, most of th...
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
secret-key cryptography / AES Cryptanalysis Cryptanalytic Hardware
2012/3/20
The block cipher Rijndael has undergone more than ten years of extensive cryptanalysis since its submission as a candidate for the Advanced Encryption Standard (AES) in April 1998. To date, most of th...
Collision for 75-step SHA-1: Intensive Parallelization with GPU
hash functions SHA-1 collisions characteristics GPU
2012/3/21
We present a brief report on the collision search for the reduced SHA-1. With a few improvements to our previous work, directed at efficient parallelization on a GPU cluster, we managed to construct a...
Collision for 75-step SHA-1: Intensive Parallelization with GPU
hash functions SHA-1 collisions characteristics GPU
2012/6/14
We present a brief report on the collision search for the reduced SHA-1. With a few improvements to our previous work, directed at efficient parallelization on a GPU cluster, we managed to construct a...
Collision for 75-step SHA-1: Intensive Parallelization with GPU
hash functions SHA-1 collisions characteristics GPU
2012/3/22
We present a brief report on the collision search for the reduced SHA-1. With a few improvements to our previous work, directed at efficient parallelization on a GPU cluster, we managed to construct a...
Efficient Implementation of the $\eta_T$ Pairing on GPU
implementation / public-key cryptography
2012/3/23
Recently, efficient implementation of cryptographic algorithms on graphics processing units (GPUs) has attracted a lot of attention in the cryptologic research community. In this paper, we deal with e...
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
AES Cryptanalysis Cryptanalytic Hardware
2012/8/28
The block cipher Rijndael has undergone more than ten years of extensive cryptanalysis since its submission as a candidate for the Advanced Encryption Standard (AES) in April 1998. To date, most of th...