搜索结果: 1-15 共查到“军队指挥学 Architecture”相关记录44条 . 查询时间(0.116 秒)
RISC-V is a promising free and open-source instruction set architecture. Most of the instruction set has been standardized and several hardware implementations are commercially available. In this pape...
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware
FPGA configurable hardware remote attestation
2019/4/23
Field-Programmable Gate Arrays or FPGAs are popular platforms for hardware-based attestation. They offer protection against physical and remote attacks by verifying if an embedded processor is running...
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture
Number Theoretic Transform Large-Degree Polynomial Multiplication Fan-Vercauteren
2019/2/27
In this paper, we present an optimized FPGA implementation of a novel, fast and highly parallelized NTT-based polynomial multiplier architecture, which proves to be effective as an accelerator for lat...
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data
FV homomorphic encryption latticebased cryptography polynomial multiplication
2019/2/25
Homomorphic encryption is a tool that enables computation on encrypted data and thus has applications in privacy-preserving cloud computing. Though conceptually amazing, implementation of homomorphic ...
ProtonMail is an online email service that claims to offer end-to-end encryption such that "even [ProtonMail] cannot read and decrypt [user] emails." The service, based in Switzerland, offers email ac...
Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow
eFPGA ASIC
2018/8/8
This work proposes the first fine-grained configurable cell array specifically tailored for cryptographic implementations. The proposed architecture can be added to future FPGAs as an application-spec...
Architecture level Optimizations for Kummer based HECC on FPGAs
hyper-elliptic curve cryptography hardware implementation architecture exploration
2017/10/16
On the basis of a software implementation of Kummer based HECC over Fp presented in 2016, we propose new hardware architectures. Our main objectives are: definition of architecture parameters (type, s...
Blurry-ORAM: A Multi-Client Oblivious Storage Architecture
Path-ORAM Oblivious storage multiple clients
2016/12/7
Since the development of tree-based Oblivious RAM by Shi et al. (Asiacrypt '11) it has become apparent that privacy preserving outsourced storage can be practical. Although most current constructions ...
Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA
FHE Homomorphic FPGA
2016/7/28
Fully Homomorphic Encryption is a powerful cryptographic tool that enables performing arbitrary meaningful computations over encrypted data. Despite its evolution over the past 7 years, FHE schemes ar...
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation
AES hardware architectures unified encryption/decryption processors
2016/6/8
This paper proposes a highly efficient AES hardware architecture that supports both encryption and decryption for the CBC mode. Some conventional AES architectures employ pipelining techniques to enha...
Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture
network on chip system on chip security
2016/6/3
The ``kernel" model has been part of operating system architecture for decades, but upon closer inspection it clearly violates the principle of least required privilege. The kernel is a single entity ...
Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic
cryptography implementation Residue Number System
2016/3/11
Residue Number System (RNS) is a method for representing an integer as an n-tuple of its residues with respect to a given base. Since RNS has inherent parallelism, it is actively researched to impleme...
Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography
public-key cryptography Elliptical Curve Cryptography
2016/1/26
Technological advancements in cloud computing due to increased connectivity and exponentially proliferating data has resulted in migration towards cloud architecture. Cloud computing is technology whe...
A Tamper and Leakage Resilient von Neumann Architecture
tamper resistance non-malleable codes
2016/1/9
We present a universal framework for tamper and leakage resilient computation on a von
Neumann Random Access Architecture (RAM in short). The RAM has one CPU that accesses
a storage, which we call t...
Private Database Access With HE-over-ORAM Architecture
Comparison Protocols Homomorphic Encryption ORAM
2016/1/9
Enabling private database queries is an important and challenging research problem with
many real-world applications. The goal is for the client to obtain the results of its queries without
learning...