Ernst & Young - Redwood Shores, CA since Jun 2012
Assurance Staff
LeapFILE/Oxygen Cloud Apr 2009 - Mar 2012
Lead Accountant
Creative Legal Marketing - Belmont, CA Jan 2009 - May 2009
Accountant (Part Time)
China Citic Bank - Chongqing City, China Jul 2006 - Aug 2006
Financial Analyst (Summer Intern)
Education:
University of Rochester - William E. Simon Graduate School of Business Administration 2007 - 2008
Master, Accountancy
Peking University 2004 - 2007
Bachelor, Statistics
Peking University 2003 - 2007
Bachelor, Financial Management
High School
Jing Deng - San Diego CA, US Max Wu - San Diego CA, US Rajesh Rao - San Marcos CA, US Fabio Hashimoto - San Diego CA, US Kenneth Westfield - San Diego CA, US
International Classification:
G06F 15/16
US Classification:
709231
Abstract:
A method and system are provided for simultaneously coupling to a plurality of client applications, receiving a first playback request from a first client application of the plurality of client applications, the first playback request being implemented in a first application specific protocol of the first client application, and a second playback request from a second client application of the plurality of client applications, the second playback request being implemented in a second application specific protocol of the second client application, wherein the first application specific protocol is different from the second application specific protocol and executing the first playback request and the second playback request by one or more players implemented in a single protocol.
Modular Exponentiation With Transparent Side Channel Attack Countermeasures
- San Diego CA, US Jing Deng - Santa Clara CA, US Justin Yongjin Kim - San Diego CA, US
International Classification:
H04L 9/00
Abstract:
A method of implementing security in a modular exponentiation function for cryptographic operations is provided. A key is obtained as a parameter when the modular exponentiation function is invoked. The key may be one of either a public key or a private key of a cryptographic key pair. Within the modular exponentiation function, the method ascertains whether the key is greater than L bits long, where L is a positive integer. A countermeasure against an attack is implemented if the key is greater than L bits long. The countermeasure may include one or more techniques (e.g., hardware and/or software techniques) that inhibit or prevent information about the key from being ascertained through analysis. One or more exponentiation operations may then be performed using the key. The same modular exponentiation function may be used to perform encryption and decryption operations but with different keys.
Dr. Deng graduated from the Guangdong Med Coll, Zhanjiang City, Guangdong, China in 1982. He works in New York, NY and 1 other location and specializes in Physical Medicine & Rehabilitation and Occupational Medicine.
Googleplus
Jing Deng
Tagline:
Fan of Star Trek, Yankees, and new things, not exactly in that order.