期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Moving from exascale to zettascale computing:challenges and techniques 被引量:5
1
作者 Xiang-ke LIAO Kai LU +8 位作者 Can-qun YANG Jin-wen LI Yuan YUAN Ming-che LAI Li-bo HUANG Ping-jing LU Jian-bin FANG Jing REN Jie SHEN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第10期1236-1244,共9页
ttigh-performance computing (HPC) is essential for both traditional and emerging scientific fields, enabling scientific activities to make progress. With the development of high-performance computing, it is foreseea... ttigh-performance computing (HPC) is essential for both traditional and emerging scientific fields, enabling scientific activities to make progress. With the development of high-performance computing, it is foreseeable that exascale computing will be put into practice around 2020. As Moore's law approaches its limit, high-perfornlance computing will face severe challenges when moving from exaseale to zettascale, making tile next 10 years after 2020 a vital period to develop key HPC techniques. In this study, we discuss the challenges of enabling zettascale computing with respect to both hardware and software. We then present a perspective of fllture HPC technology evolution and revolution, leading to our main recommendations in support of zettaseale computing in the coming future. 展开更多
关键词 High-performance COMPUTING Zettascale micro-architectures INTERCONNECTION Storage system Manufacturing process PROGRAMMING models and environments
原文传递
Efficient electro-magnetic analysis of a GPU bitsliced AES implementation
2
作者 Yiwen Gao Yongbin Zhou Wei Cheng 《Cybersecurity》 CSCD 2020年第1期54-70,共17页
The advent of CUDA-enabled GPU makes it possible to provide cloud applications with high-performance data security services.Unfortunately,recent studies have shown that GPU-based applications are also susceptible to s... The advent of CUDA-enabled GPU makes it possible to provide cloud applications with high-performance data security services.Unfortunately,recent studies have shown that GPU-based applications are also susceptible to side-channel attacks.These published work studied the side-channel vulnerabilities of GPU-based AES implementations by taking the advantage of the cache sharing among multiple threads or high parallelism of GPUs.Therefore,for GPU-based bitsliced cryptographic implementations,which are immune to the cache-based attacks referred to above,only a power analysis method based on the high-parallelism of GPUs may be effective.However,the leakage model used in the power analysis is not efficient at all in practice.In light of this,we investigate electro-magnetic(EM)side-channel vulnerabilities of a GPU-based bitsliced AES implementation from the perspective of bit-level parallelism and thread-level parallelism in order to make the best of the localization effect of EM leakage with parallelism.Specifically,we propose efficient multi-bit and multi-thread combinational analysis techniques based on the intrinsic properties of bitsliced ciphers and the effect of multi-thread parallelism of GPUs,respectively.The experimental result shows that the proposed combinational analysis methods perform better than non-combinational and intuitive ones.Our research suggests that multi-thread leakages can be used to improve attacks if the multi-thread leakages are not synchronous in the time domain. 展开更多
关键词 GPU-based cryptographic implementations Side-channel analysis(SCA) Electro-magnetic attacks(EMA) micro-architectural vulnerabilities Combinational analysis
原文传递
Efficient electro-magnetic analysis of a GPU bitsliced AES implementation
3
作者 Yiwen Gao Yongbin Zhou Wei Cheng 《Cybersecurity》 2018年第1期680-696,共17页
The advent of CUDA-enabled GPU makes it possible to provide cloud applications with high-performance data security services.Unfortunately,recent studies have shown that GPU-based applications are also susceptible to s... The advent of CUDA-enabled GPU makes it possible to provide cloud applications with high-performance data security services.Unfortunately,recent studies have shown that GPU-based applications are also susceptible to side-channel attacks.These published work studied the side-channel vulnerabilities of GPU-based AES implementations by taking the advantage of the cache sharing among multiple threads or high parallelism of GPUs.Therefore,for GPU-based bitsliced cryptographic implementations,which are immune to the cache-based attacks referred to above,only a power analysis method based on the high-parallelism of GPUs may be effective.However,the leakage model used in the power analysis is not efficient at all in practice.In light of this,we investigate electro-magnetic(EM)side-channel vulnerabilities of a GPU-based bitsliced AES implementation from the perspective of bit-level parallelism and thread-level parallelism in order to make the best of the localization effect of EM leakage with parallelism.Specifically,we propose efficient multi-bit and multi-thread combinational analysis techniques based on the intrinsic properties of bitsliced ciphers and the effect of multi-thread parallelism of GPUs,respectively.The experimental result shows that the proposed combinational analysis methods perform better than non-combinational and intuitive ones.Our research suggests that multi-thread leakages can be used to improve attacks if the multi-thread leakages are not synchronous in the time domain. 展开更多
关键词 GPU-based cryptographic implementations Side-channel analysis(SCA) Electro-magnetic attacks(EMA) micro-architectural vulnerabilities Combinational analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部