Wuqiong Pan

According to our database1, Wuqiong Pan authored at least 15 papers between 2011 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OS.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2018
Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs.
Proceedings of the Security and Privacy in Communication Networks, 2018

Towards High-performance X25519/448 Key Agreement in General Purpose GPUs.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration.
IEEE Trans. Inf. Forensics Secur., 2017

Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration.
Secur. Commun. Networks, 2017

SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

High-Performance Symmetric Cryptography Server with GPU Acceleration.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

2014
Exploiting the Potential of GPUs for Modular Multiplication in ECC.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Exploiting the Floating-Point Computing Power of GPUs for RSA.
Proceedings of the Information Security - 17th International Conference, 2014

2013
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

2012
Improving Virtualization Security by Splitting Hypervisor into Smaller Components.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

2011
Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

An Efficient RSA Implementation without Precomputation.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011


  Loading...