cihangirtezcan / CUDA_AESLinks
Breakthrough AES Performance on CUDA Devices
☆39Updated 5 months ago
Alternatives and similar repositories for CUDA_AES
Users that are interested in CUDA_AES are comparing it to the libraries listed below
Sorting:
- ECM Factorization on CUDA-GPUs☆13Updated 4 years ago
- A bitsliced implementation of ECB and CTR AES☆52Updated last year
- Intel Homomorphic Encryption Acceleration Library accelerates modular arithmetic operations used in homomorphic encryption by leveraging …☆239Updated 3 weeks ago
- ☆22Updated last month
- Intel Homomorphic Encryption Acceleration Library for FPGAs, including open source implementation of FPGA kernels for accelerating NTT, I…☆104Updated 2 years ago
- Artifacts for our ShowTime paper (AsiaCCS '23), including distinguishing cache hits and misses with the human eye.☆13Updated 2 years ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆42Updated last year
- Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution☆33Updated 7 years ago
- ☆38Updated 10 months ago
- The Intel Homomorphic Encryption (HE) toolkit is the primordial vehicle for the continuous distribution of the Intel HE technological in…☆121Updated 3 months ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆21Updated 2 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆74Updated last month
- Intel® Software Guard Extensions SSL☆231Updated 6 months ago
- AMD SEV Tool☆86Updated 2 years ago
- ☆22Updated last year
- A practical attack framework for precise enclave execution control☆459Updated 3 months ago
- ☆34Updated last year
- ☆60Updated last year
- ☆28Updated 2 years ago
- NEON implementation of NIST lattice-based PQC finalists☆20Updated 3 years ago
- The Intel® Software Guard Extensions Enclave Memory Manager is a module designed to manage dynamic memory within an SGX runtime.☆27Updated 4 months ago
- An Implementation of the Number Theoretic Transform☆48Updated last year
- A repository of tools for verifying constant-timeness☆18Updated 6 months ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆32Updated last year
- Intel’s HERACLES accelerator introduces a new set of fundamental instructions, the Polynomial Instructions Set Architecture (P-ISA) that …☆43Updated last week
- ☆45Updated 6 years ago
- ☆34Updated 3 weeks ago
- ☆70Updated 2 years ago
- E3: Encrypt-Everything-Everywhere framework for compiling C++ programs with encrypted operands.☆94Updated 2 years ago
- ☆183Updated 4 years ago