Search Results - "Nejatollahi, Hamid"

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Exploring Energy Efficient Architectures for RLWE Lattice-Based Cryptography by Nejatollahi, Hamid, Shahhosseini, Sina, Cammarota, Rosario, Dutt, Nikil

    Published in Journal of signal processing systems (01-10-2021)
    “…Quantum computers are imminent threat to secure signal processing because they can break the contemporary public-key cryptography schemes in polynomial time…”
    Get full text
    Journal Article
  2. 2

    Data Reuse for Accelerated Approximate Warps by Peroni, Daniel, Imani, Mohsen, Nejatollahi, Hamid, Dutt, Nikil, Rosing, Tajana

    “…Many data-driven applications, including computer vision, machine learning, speech recognition, and medical diagnostics show tolerance to computation error…”
    Get full text
    Journal Article
  3. 3

    Flexible NTT Accelerators for RLWE Lattice-Based Cryptography by Nejatollahi, Hamid, Cammarota, Rosario, Dutt, Nikil

    “…In this work, we propose methods to design flexible and energy-efficient hardware accelerators for ring learning with error (RLWE) lattice-based cryptographic…”
    Get full text
    Conference Proceeding
  4. 4

    Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors by Nejatollahi, Hamid, Shahhosseini, Sina, Cammarota, Rosario, Dutt, Nikil

    “…Quantum computers threaten to break public-key cryptography schemes such as DSA and ECDSA in polynomial time, which poses an imminent threat to secure signal…”
    Get full text
    Conference Proceeding
  5. 5

    Voltage scaling and dark silicon in symmetric multicore processors by Nejatollahi, Hamid, Salehi, Mostafa E.

    Published in The Journal of supercomputing (01-10-2015)
    “…As technology scales further, multicore and many-core processors emerge as an alternative to keep up with performance demands. However, because of power and…”
    Get full text
    Journal Article
  6. 6

    Programmable Accelerators for Lattice-Based Cryptography by Nejatollahi, Hamid

    Published 01-01-2020
    “…Advances in computing steadily erode computer security at its foundation, calling for fundamental innovations to strengthen the weakening cryptographic…”
    Get full text
    Dissertation
  7. 7

    CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware by Nejatollahi, Hamid, Gupta, Saransh, Imani, Mohsen, Rosing, Tajana Simunic, Cammarota, Rosario, Dutt, Nikil

    “…Quantum computers promise to solve hard mathematical problems such as integer factorization and discrete logarithms in polynomial time, making standardized…”
    Get full text
    Conference Proceeding
  8. 8

    ARGA: Approximate Reuse for GPGPU Acceleration by Peroni, Daniel, Imani, Mohsen, Nejatollahi, Hamid, Dutt, Nikil, Rosing, Tajana

    “…Many data-driven applications including computer vision, speech recognition, and medical diagnostics show tolerance to error during computation. These…”
    Get full text
    Conference Proceeding
  9. 9

    Special session: trends, challenges and needs for lattice-based cryptography implementations by Nejatollahi, Hamid, Dutt, Nikil, Cammarota, Rosario

    “…Advances in computing steadily erode computer security at its foundation, calling for fundamental innovations to strengthen the weakening cryptographic…”
    Get full text
    Conference Proceeding
  10. 10

    Small Memory Footprint Neural Network Accelerators by Seto, Kenshu, Nejatollahi, Hamid, An, Jiyoung, Kang, Sujin, Dutt, Nikil

    “…Deep Neural Network (DNN) accelerators provide high-accuracy data recognition that are commonly used in edge devices. However, resource constrained edge…”
    Get full text
    Conference Proceeding
  11. 11

    Trends, challenges and needs for lattice-based cryptography implementations: special session by Nejatollahi, Hamid, Dutt, Nikil, Cammarota, Rosario

    “…Advances in computing steadily erode computer security at its foundation, calling for fundamental innovations to strengthen the weakening cryptographic…”
    Get full text
    Conference Proceeding
  12. 12

    High-Performance Parallel Fault Simulation for Multi-Core Systems by Karami, Masoomeh, Haghbayan, Mohammad-hashem, Ebrahimi, Masoumeh, Nejatollahi, Hamid, Tenhunen, Hannu, Plosila, Juha

    “…Fault simulation is a time-consuming process that requires customized methods and techniques to accelerate it. Multi-threading and Multi-core approaches are…”
    Get full text
    Conference Proceeding
  13. 13

    Effect of voltage scaling on symmetric multicore's speed-up by Nejatollahi, Hamid, Salehi, Mostafa E.

    “…As the technology scales further, multicore and many-core processors emerged as an alternative to keep up with performance demands. But because of power and…”
    Get full text
    Conference Proceeding
  14. 14

    Fast and area efficient implementation for chaotic image encryption algorithms by Ansarmohammadi, Sied Ali, Shahinfar, Saeed, Nejatollahi, Hamid

    “…The chaotic image encryption algorithm has been the focus of attention for years due to its remarkable functions in the realm of image processing. The National…”
    Get full text
    Conference Proceeding
  15. 15