- Cryptography and Data Security
- Cryptographic Implementations and Security
- Cryptography and Residue Arithmetic
- Environmental and Agricultural Sciences
- Coding theory and cryptography
- Manufacturing Process and Optimization
- Environmental Changes in China
- Simulation and Modeling Applications
- Industrial Technology and Control Systems
- Advanced Data Storage Technologies
- Industrial Engineering and Technologies
- Ginseng Biological Effects and Applications
- Evaluation Methods in Various Fields
- Advanced Sensor and Control Systems
- Mineral Processing and Grinding
- Remote Sensing and Land Use
- Injection Molding Process and Properties
- Education and Work Dynamics
- Elevator Systems and Control
- Public Administration and Governance
- Geochemistry and Elemental Analysis
- DNA and Biological Computing
- Regional Economic and Spatial Analysis
- Geological and Geophysical Studies
- Construction Engineering and Safety
State Key Laboratory of Cryptology
2022-2024
University of Chinese Academy of Sciences
2020-2024
Institute of Information Engineering
2020-2023
Chinese Academy of Sciences
2021-2023
Data Assurance and Communication Security
2020-2023
Kyung Hee University
2012
Jilin University
2012
Local Initiatives Support Corporation
2008
The potential benefits or the tissue-damaging effects of inflammatory response after central nervous system injuries have long been disputed. Recent studies noted that substance P (SP), a neuropeptide, plays an important role in wound-healing process by recruiting bone marrow stem cells to injured tissue. In this study, we examined whether SP can enhance recovery from spinal cord injury (SCI) Sprague-Dawley rats through its known function cell mobilization and/or modulation inflammation. We...
Driven by artificial intelligence and computer vision industries, Graphics Processing Units (GPUs) are now rapidly achieving extraordinary computing power. In particular, the NVIDIA Tegra K1/X1/X2 embedded GPU platforms, which also treated as edge devices, widely used in environments such mobile phones, game consoles, vehicle-mounted systems to support high-dimension display, auto-pilot, so on. Meanwhile, with rise of Internet Things (IoT), demand for cryptographic operations secure...
The remarkable performance capabilities of AI accelerators offer promising opportunities for accelerating cryptographic algorithms, particularly in the context lattice-based cryptography. However, current approaches to leveraging often remain at a rudimentary level implementation, overlooking intricate internal mechanisms these devices. Consequently, significant number computational resources is underutilized.In this paper, we present comprehensive exploration NVIDIA Tensor Cores and...
Two entities, who only share a password and communicate over an insecure channel, authenticate each other agree on large session key for protecting their subsequent communication. This is called the password-authenticated exchange (PAKE) protocol. PAKE protocol has been considered suitable substitute prevailing hash-based authentication which vulnerable to various attacks. However, vendors are discouraged by both its prohibitively computational overheads as well integrating costs, leading...
With the advancement of processor technology, general-purpose GPUs have become popular parallel computing accelerators in cloud. However, designed for graphics rendering and high-performance computing, are born without sound security mechanisms. Consequently, GPU-based service cloud is vulnerable to attacks from potentially compromised guest OS as large amounts sensitive code data offloaded directly unprotected GPUs.In this paper, we propose SEGIVE, a practical framework secure GPU execution...
Industrial Internet of Things (IIoT) has strict requirements on the performance and security devices. Public-key cryptography, as a kind computing resource-consuming algorithm, is widely used in digital signature, key exchange, so on. The embedded graphics processing units (GPUs) are now rapidly achieving extraordinary power, such NVIDIA Tegra K1/X1/X2/Xavier, which also treated edge They IIoT environments, intelligent manufacturing, smart cities, vehicle-mounted systems. advantages endow...
Module Learning with Errors (MLWE) based approaches for Fully Homomorphic Encryption (FHE) have garnered attention due to their potential enhance hardware-friendliness and implementation efficiency. However, despite these advantages, overall performance still trails behind traditional schemes on Ring (RLWE). This indicates that while MLWE-based constructions hold promise, there remain significant challenges overcome in bridging the gap RLWE-based FHE schemes. By uncovering reasons...
Fully Homomorphic Encryption (FHE) allows computations on encrypted data without knowledge of the plaintext message and currently has been focus both academia industry. However, performance issue hinders its large-scale application, highlighting urgent requirements high-performance FHE implementations.With noticing tremendous potential GPUs in field cryptographic acceleration, this paper comprehensively investigates how to convert available computing resources residing into workhorses,...