default search action
Fangyu Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin:
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 25-63 (2024) - [j8]Mingyu Wang, Fangyu Zheng, Jingqiang Lin, Fangjie Jiang, Yuan Ma:
ZeroShield: Transparently Mitigating Code Page Sharing Attacks With Zero-Cost Stand-By. IEEE Trans. Inf. Forensics Secur. 19: 7389-7403 (2024) - [c31]Mingyu Wang, Lingjia Meng, Fangyu Zheng, Jingqiang Lin, Shijie Jia, Yuan Ma, Haoling Fan:
TLTracer: Dynamically Detecting Cache Side Channel Attacks with a Timing Loop Tracer. ICC 2024: 109-114 - [c30]Mingyu Wang, Shijie Jia, Fangyu Zheng, Yuan Ma, Jingqiang Lin, Lingjia Meng, Ziqiang Ma:
TF-Timer: Mitigating Cache Side-Channel Attacks in Cloud through a Targeted Fuzzy Timer. WCNC 2024: 1-6 - [i3]Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin:
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches. IACR Cryptol. ePrint Arch. 2024: 95 (2024) - [i2]Yijing Ning, Jiankuo Dong, Jingqiang Lin, Fangyu Zheng, Yu Fu, Zhenjiang Dong, Fu Xiao:
GRASP: Accelerating Hash-based PQC Performance on GPU Parallel Architecture. IACR Cryptol. ePrint Arch. 2024: 1030 (2024) - 2023
- [j7]Jiankuo Dong, Pinchang Zhang, Kaisheng Sun, Fu Xiao, Fangyu Zheng, Jingqiang Lin:
EG-Four$\mathbb {Q}$: An Embedded GPU-Based Efficient ECC Cryptography Accelerator for Edge Computing. IEEE Trans. Ind. Informatics 19(6): 7291-7300 (2023) - [c29]Qingguan Gao, Kaisheng Sun, Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Yongjun Ren, Zhe Liu:
V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture. Inscrypt (2) 2023: 130-149 - [c28]Bowen Xu, Shijie Jia, Jingqiang Lin, Fangyu Zheng, Yuan Ma, Limin Liu, Xiaozhuo Gu, Li Song:
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications. ESORICS (3) 2023: 263-282 - [c27]Yi Bian, Fangyu Zheng, Yuewu Wang, Lingguang Lei, Yuan Ma, Jiankuo Dong, Jiwu Jing:
AsyncGBP: Unleashing the Potential of Heterogeneous Computing for SSL/TLS with GPU-based Provider. ICPP 2023: 337-346 - [c26]Guang Fan, Fangyu Zheng, Lipeng Wan, Lili Gao, Yuan Zhao, Jiankuo Dong, Yixuan Song, Yuewu Wang, Jingqiang Lin:
Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs. IPDPS 2023: 798-808 - [c25]Lingjia Meng, Yu Fu, Fangyu Zheng, Ziqiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin:
Protecting Private Keys of Dilithium Using Hardware Transactional Memory. ISC 2023: 288-306 - [c24]Haoling Fan, Fangyu Zheng, Jingqiang Lin, Lingjia Meng, Mingyu Wang, Qiang Wang, Shijie Jia, Yuan Ma:
Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software. TrustCom 2023: 796-803 - 2022
- [j6]Jiankuo Dong, Guang Fan, Fangyu Zheng, Tianyu Mao, Fu Xiao, Jingqiang Lin:
TEGRAS: An Efficient Tegra Embedded GPU-Based RSA Acceleration Server. IEEE Internet Things J. 9(18): 16850-16861 (2022) - [j5]Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Zhe Liu, Fu Xiao, Guang Fan:
EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2. ACM Trans. Embed. Comput. Syst. 21(2): 16:1-16:25 (2022) - [c23]Wenqing Li, Shijie Jia, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin:
CryptoGo: Automatic Detection of Go Cryptographic API Misuses. ACSAC 2022: 318-331 - [c22]Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Yuewu Wang, Jingqiang Lin, Jiankuo Dong:
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator. ESORICS (3) 2022: 514-534 - [c21]Mingshu Du, Yuan Ma, Na Lv, Tianyu Chen, Shijie Jia, Fangyu Zheng:
An Empirical Study on the Quality of Entropy Sources in Linux Random Number Generator. ICC 2022: 559-564 - [c20]Jiankuo Dong, Sheng Lu, Pinchang Zhang, Fangyu Zheng, Fu Xiao:
G-SM3: High-Performance Implementation of GPU-based SM3 Hash Function. ICPADS 2022: 201-208 - [i1]Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Jiankuo Dong, Jingqiang Lin, Yuewu Wang:
A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator. IACR Cryptol. ePrint Arch. 2022: 881 (2022) - 2021
- [j4]Chiwei Xiao, Peng Li, Zhiming Feng, Fangyu Zheng:
Global border watch: From land use change to joint action. Int. J. Appl. Earth Obs. Geoinformation 103: 102494 (2021) - [j3]Lili Gao, Fangyu Zheng, Rong Wei, Jiankuo Dong, Niall Emmart, Yuan Ma, Jingqiang Lin, Charles C. Weems:
DPF-ECC: A Framework for Efficient ECC With Double Precision Floating-Point Computing Power. IEEE Trans. Inf. Forensics Secur. 16: 3988-4002 (2021) - [c19]Rong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang:
Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World Deployment. ACSAC 2021: 76-90 - [c18]Lipeng Wan, Fangyu Zheng, Jingqiang Lin:
TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator. SecureComm (1) 2021: 249-269 - [c17]Guang Fan, Fangyu Zheng, Jiankuo Dong, Jingqiang Lin, Lili Gao, Rong Wei, Lipeng Wan:
SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System. WASA (2) 2021: 107-122 - [c16]Jiankuo Dong, Guang Fan, Fangyu Zheng, Jingqiang Lin, Fu Xiao:
TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2. WASA (2) 2021: 210-222 - 2020
- [c15]Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Guang Fan, Jiankuo Dong:
SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment. IPCCC 2020: 1-10 - [c14]Lili Gao, Fangyu Zheng, Niall Emmart, Jiankuo Dong, Jingqiang Lin, Charles C. Weems:
DPF-ECC: Accelerating Elliptic Curve Cryptography with Floating-Point Computing Power of GPUs. IPDPS 2020: 494-504
2010 – 2019
- 2018
- [c13]Niall Emmart, Fangyu Zheng, Charles C. Weems:
Faster Modular Exponentiation Using Double Precision Floating Point Arithmetic on the GPU. ARITH 2018: 130-137 - [c12]Niall Emmart, Fangyu Zheng, Charles C. Weems:
A New Variant of the Barrett Algorithm Applied to Quotient Selection. ARITH 2018: 138-144 - [c11]Jiankuo Dong, Fangyu Zheng, Juanjuan Cheng, Jingqiang Lin, Wuqiong Pan, Ziyang Wang:
Towards High-performance X25519/448 Key Agreement in General Purpose GPUs. CNS 2018: 1-9 - [c10]Shiran Pan, Fangyu Zheng, Wen Tao Zhu, Qiongxiao Wang:
Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization. CNS 2018: 1-9 - [c9]Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong:
Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation. ICICS 2018: 142-157 - [c8]Jiankuo Dong, Fangyu Zheng, Niall Emmart, Jingqiang Lin, Charles C. Weems:
sDPF-RSA: Utilizing Floating-point Computing Power of GPUs for Massive Digital Signature Computations. IPDPS 2018: 599-609 - [c7]Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li:
Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs. SecureComm (1) 2018: 512-528 - [c6]Shiran Pan, Qiongxiao Wang, Fangyu Zheng, Jiankuo Dong:
Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation. WASA 2018: 374-386 - 2017
- [j2]Jiankuo Dong, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. Secur. Commun. Networks 2017: 3508786:1-3508786:15 (2017) - [j1]Wuqiong Pan, Fangyu Zheng, Yuan Zhao, Wen Tao Zhu, Jiwu Jing:
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. IEEE Trans. Inf. Forensics Secur. 12(1): 111-122 (2017) - [c5]Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li:
High-Performance Symmetric Cryptography Server with GPU Acceleration. ICICS 2017: 529-540 - 2016
- [c4]Yuan Zhao, Wuqiong Pan, Jingqiang Lin, Peng Liu, Cong Xue, Fangyu Zheng:
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA. SAC 2016: 482-500 - [c3]Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma:
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks. SEC 2016: 293-307 - 2014
- [c2]Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Exploiting the Floating-Point Computing Power of GPUs for RSA. ISC 2014: 198-215 - [c1]Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Exploiting the Potential of GPUs for Modular Multiplication in ECC. WISA 2014: 295-306
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint