Fan Guang

ORCID: 0000-0002-5389-0823
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Cryptography and Residue Arithmetic
  • Environmental and Agricultural Sciences
  • Coding theory and cryptography
  • Manufacturing Process and Optimization
  • Environmental Changes in China
  • Simulation and Modeling Applications
  • Industrial Technology and Control Systems
  • Advanced Data Storage Technologies
  • Industrial Engineering and Technologies
  • Ginseng Biological Effects and Applications
  • Evaluation Methods in Various Fields
  • Advanced Sensor and Control Systems
  • Mineral Processing and Grinding
  • Remote Sensing and Land Use
  • Injection Molding Process and Properties
  • Education and Work Dynamics
  • Elevator Systems and Control
  • Public Administration and Governance
  • Geochemistry and Elemental Analysis
  • DNA and Biological Computing
  • Regional Economic and Spatial Analysis
  • Geological and Geophysical Studies
  • Construction Engineering and Safety

State Key Laboratory of Cryptology
2022-2024

University of Chinese Academy of Sciences
2020-2024

Institute of Information Engineering
2020-2023

Chinese Academy of Sciences
2021-2023

Data Assurance and Communication Security
2020-2023

Kyung Hee University
2012

Jilin University
2012

Local Initiatives Support Corporation
2008

The potential benefits or the tissue-damaging effects of inflammatory response after central nervous system injuries have long been disputed. Recent studies noted that substance P (SP), a neuropeptide, plays an important role in wound-healing process by recruiting bone marrow stem cells to injured tissue. In this study, we examined whether SP can enhance recovery from spinal cord injury (SCI) Sprague-Dawley rats through its known function cell mobilization and/or modulation inflammation. We...

10.1097/wnr.0b013e3283572206 article EN Neuroreport 2012-07-21

Driven by artificial intelligence and computer vision industries, Graphics Processing Units (GPUs) are now rapidly achieving extraordinary computing power. In particular, the NVIDIA Tegra K1/X1/X2 embedded GPU platforms, which also treated as edge devices, widely used in environments such mobile phones, game consoles, vehicle-mounted systems to support high-dimension display, auto-pilot, so on. Meanwhile, with rise of Internet Things (IoT), demand for cryptographic operations secure...

10.1145/3492734 article EN ACM Transactions on Embedded Computing Systems 2022-02-08

The remarkable performance capabilities of AI accelerators offer promising opportunities for accelerating cryptographic algorithms, particularly in the context lattice-based cryptography. However, current approaches to leveraging often remain at a rudimentary level implementation, overlooking intricate internal mechanisms these devices. Consequently, significant number computational resources is underutilized.In this paper, we present comprehensive exploration NVIDIA Tensor Cores and...

10.46586/tches.v2024.i2.25-63 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2024-03-12

Two entities, who only share a password and communicate over an insecure channel, authenticate each other agree on large session key for protecting their subsequent communication. This is called the password-authenticated exchange (PAKE) protocol. PAKE protocol has been considered suitable substitute prevailing hash-based authentication which vulnerable to various attacks. However, vendors are discouraged by both its prohibitively computational overheads as well integrating costs, leading...

10.1145/3485832.3485877 article EN Annual Computer Security Applications Conference 2021-12-06

With the advancement of processor technology, general-purpose GPUs have become popular parallel computing accelerators in cloud. However, designed for graphics rendering and high-performance computing, are born without sound security mechanisms. Consequently, GPU-based service cloud is vulnerable to attacks from potentially compromised guest OS as large amounts sensitive code data offloaded directly unprotected GPUs.In this paper, we propose SEGIVE, a practical framework secure GPU execution...

10.1109/ipccc50635.2020.9391574 article EN 2020-11-06

Industrial Internet of Things (IIoT) has strict requirements on the performance and security devices. Public-key cryptography, as a kind computing resource-consuming algorithm, is widely used in digital signature, key exchange, so on. The embedded graphics processing units (GPUs) are now rapidly achieving extraordinary power, such NVIDIA Tegra K1/X1/X2/Xavier, which also treated edge They IIoT environments, intelligent manufacturing, smart cities, vehicle-mounted systems. advantages endow...

10.1109/jiot.2022.3152203 article EN IEEE Internet of Things Journal 2022-02-17

Module Learning with Errors (MLWE) based approaches for Fully Homomorphic Encryption (FHE) have garnered attention due to their potential enhance hardware-friendliness and implementation efficiency. However, despite these advantages, overall performance still trails behind traditional schemes on Ring (RLWE). This indicates that while MLWE-based constructions hold promise, there remain significant challenges overcome in bridging the gap RLWE-based FHE schemes. By uncovering reasons...

10.1145/3658644.3690280 article EN other-oa 2024-12-02

Fully Homomorphic Encryption (FHE) allows computations on encrypted data without knowledge of the plaintext message and currently has been focus both academia industry. However, performance issue hinders its large-scale application, highlighting urgent requirements high-performance FHE implementations.With noticing tremendous potential GPUs in field cryptographic acceleration, this paper comprehensively investigates how to convert available computing resources residing into workhorses,...

10.1109/ipdps54959.2023.00085 article EN 2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS) 2023-05-01
Coming Soon ...