
Archive of posts tagged: Security


Cryptography for Secure Computing: A New Hardware Acceleration Opportunity
Big Data and artificial intelligence have empowered the data-driven computing paradigm, in which data become the most precious resources. Specifically, if one could make use of data not only of herself, but also from other sources to constitute larger datasets, it...
Architectures and Security of FPGA-Accelerated Cloud Computing
FPGAs in Cloud Computing The availability of Field Programmable Gate Arrays (FPGAs) in cloud datacenters has opened up new ways to improve application performance by letting users write their own custom hardware accelerators that they can realize on the FPGAs....
Post Quantum Cryptography
Quantum computers, once seen as a remote theoretical possibility, are now a widely accepted and imminent reality. By exploiting the probabilistic rules of quantum physics, quantum computers can leverage Shor’s algorithm to initiate several breakthroughs, including...