• Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures 

      Mhaisen, Naram; Punkar, Mayur; Wang, Yongge; Desmedt, Yvo; Malluhi, Qutaibah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ...
    • Breaking HK17 in Practice 

      Li, Haoyu; Liu, Renzhang; Malluhi, Qutaibah M.; Pan, Yanbin; Wang, Yongge; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In November 2017, Hecht and Kamlofsky submitted HK17, a quaternion(octonion)-based Diffie-Hellman key exchange protocol, to NIST post-quantum cryptography project, and thought that at least O(p8) arithmetic operations are ...
    • Candidate MDS array codes for tolerating three disk failures in RAID-7 architectures 

      Punekar, Mayur; Malluhi, Qutaibah; Wang, Yongge; Desmedt, Yvo ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      Current storage systems use RAID-5 and RAID-6 architectures to provide protection against one and two disk failures, respectively. However, as the size of storage system grows rapidly three concurrent disk failures are ...
    • Data confidentiality in cloud-based pervasive system 

      Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
      Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khancb, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2016 , Conference Paper)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Reusable garbled turing machines without FHE 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2019 , Conference Paper)
      Since Yao introduced the garbled circuit concept in 1980s, it has been an open problem to design efficient reusable garbled Turing machines/circuits. Recently, Goldwasser et al. and Garg et al. answered this question ...
    • The limit of blockchains: Infeasibility of a smart obama-trump contract 

      Wang, Yongge; Malluhi, Qutaibah M. ( Association for Computing Machinery , 2019 , Article)
      Although smart contracts are Turing complete, it is a misconception that they can fulfill all routine contracts.