Author of the publication

AsyncGBP: Unleashing the Potential of Heterogeneous Computing for SSL/TLS with GPU-based Provider.

, , , , , , and . ICPP, page 337-346. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Jamming Attack Detection Under Noise Uncertainty in mmWave Massive MIMO Systems., , , , and . IEEE Trans. Veh. Technol., 72 (7): 9002-9016 (July 2023)AP-CDE: Cost-Efficient Authentication Protocol for Cross-Domain Data Exchange in IIoT., , , , and . IEEE Syst. J., 17 (3): 3882-3893 (September 2023)G-SM3: High-Performance Implementation of GPU-based SM3 Hash Function., , , , and . ICPADS, page 201-208. IEEE, (2022)SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment., , , , and . IPCCC, page 1-10. IEEE, (2020)Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs., , , , , , , , and . IPDPS, page 798-808. IEEE, (2023)Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration., , , , , and . Secur. Commun. Networks, (2017)EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2., , , , , and . ACM Trans. Embed. Comput. Syst., 21 (2): 16:1-16:25 (2022)Efficient Arithmetic for Polynomial Multiplication in Post-quantum Lattice-Based Cryptosystem on RISC-V Platform., , , , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 439-458. Springer, (2023)SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System., , , , , , and . WASA (2), volume 12938 of Lecture Notes in Computer Science, page 107-122. Springer, (2021)Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation., , , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 374-386. Springer, (2018)