[HTML][HTML] Private set intersection: A systematic literature review

D Morales, I Agudo, J Lopez - Computer Science Review, 2023 - Elsevier
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …

Combining residue arithmetic to design efficient cryptographic circuits and systems

L Sousa, S Antao, P Martins - IEEE Circuits and Systems …, 2016 - ieeexplore.ieee.org
Cryptography plays a major role assuring security in computation and communication. In
particular, public-key cryptography enables the asymmetrical ciphering of data along with …

SIDH on ARM: faster modular multiplications for faster post-quantum supersingular isogeny key exchange

H Seo, Z Liu, P Longa, Z Hu - IACR Transactions on Cryptographic …, 2018 - tches.iacr.org
We present high-speed implementations of the post-quantum supersingular isogeny Diffie-
Hellman key exchange (SIDH) and the supersingular isogeny key encapsulation (SIKE) …

Efficient arithmetic on ARM‐NEON and its application for high‐speed RSA implementation

H Seo, Z Liu, J Großschädl… - Security and …, 2016 - Wiley Online Library
Advanced modern processors support single instruction, multiple data instructions (eg, Intel‐
AVX and ARM‐NEON) and a massive body of research on vector‐parallel implementations …

SIKE in 32-bit ARM processors based on redundant number system for NIST level-II

H Seo, P Sanal, R Azarderakhsh - ACM Transactions on Embedded …, 2021 - dl.acm.org
We present an optimized implementation of the post-quantum Supersingular Isogeny Key
Encapsulation (SIKE) for 32-bit ARMv7-A processors supporting NEON engine (ie, SIMD …

Accéleration des traitements de la sécurité mobile avec le calcul parallèle

M Abdellatif - 2016 - espace.etsmtl.ca
L'accélération des traitements relatifs à la sécurité mobile est devenue l'un des problèmes
les plus importants vu la croissance exponentielle et l'impact important des attaques ciblant …

Design of Multi Cipher Processing Architecture for Random Cross Access

L Li, F Li, K Geng, G Shi - Microprocessors and Microsystems, 2018 - Elsevier
Aiming at the requirement of random cross business generated by mass data cryptosystems
in security field, in this paper, a pipeline data processing architecture which includes four …

ARM/NEON Co-design of Multiplication/Squaring

H Seo, T Park, J Ji, Z Hu, H Kim - International Workshop on Information …, 2017 - Springer
Many modern mobile processors support new SIMD extensions (eg NEON engine) and
previous applications (eg image processing, cryptography) written in SISD are accelerated …

[PDF][PDF] COMME EXIGENCE PARTIELLE À L'OBTENTION DE LA MAÎTRISE EN GÉNIE M. Sc. A.

A LE CALCUL - users.encs.concordia.ca
RÉSUMÉ L'accélération des traitements relatifs à la sécurité mobile est devenue l'un des
problèmes les plus importants vu la croissance exponentielle et l'impact important des …