Protecting the confidentiality of cryptographic keys in the event of partial or full system compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web servers, is an indicative example. In this paper we present Pixel-Vault, a system for keeping cryptographic keys and carrying out cryptographic operations exclusively on the GPU, which allows it to protect secret keys from leakage even in the event of full system compromise. This is possible by exposing secret keys only in GPU registers, keeping PixelVault’s critical code in the GPU instruction cache, and preventing any access to both of them from the host. Due to the non-preemptive exe...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
This work describes one - way hash functions and cryptographic algorithms . It also describes their ...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
The reader will be familiar with selected concepts of cryptography consited in this work. AES algori...
Since users rely on passwords to authenticate themselves to computer systems, ad-versaries attempt t...
Cryptographic algorithm implementations are vulnerable to Cold Boot attacks, which consist in exploi...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Many of us use encryption frequently whether realising it or not; it is the active yet often invisib...
Dark silicon is pushing processor vendors to add more specialized units such as accelerators to comm...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
One of the challenges encryption faces is it is computationally intensive and therefore slow, it is ...
Software that covertly monitors user actions, also known as spyware, has become a first-level securi...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
This work describes one - way hash functions and cryptographic algorithms . It also describes their ...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
The reader will be familiar with selected concepts of cryptography consited in this work. AES algori...
Since users rely on passwords to authenticate themselves to computer systems, ad-versaries attempt t...
Cryptographic algorithm implementations are vulnerable to Cold Boot attacks, which consist in exploi...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Many of us use encryption frequently whether realising it or not; it is the active yet often invisib...
Dark silicon is pushing processor vendors to add more specialized units such as accelerators to comm...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
One of the challenges encryption faces is it is computationally intensive and therefore slow, it is ...
Software that covertly monitors user actions, also known as spyware, has become a first-level securi...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
This work describes one - way hash functions and cryptographic algorithms . It also describes their ...