Cryptography, the science of writing secrets, has been used for centuries to conceal information from eavesdroppers and spies. Today, in the information age, data security and authenticity are paramount, as more services and applications start to rely on the Internet, an unsecured channel. Despite the existence of security protocols and implementations, many online services refrain to use cryptographic algorithms due to their poor performance, even when using cryptography would be a clear advantage. Graphics processing units (GPU) have been increasingly used in the last few years for general purpose computing. We present and describe serial and parallel efficient algorithms for modular arithmetic in the GPU. Based on these, we developed GPU...
International audienceData confidentiality is one of the most critical security services. Many encry...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
GPU is widely used in various applications that require huge computational power. In this paper, we ...
In the field of cryptography, public key algorithms are widely known to be slower than symmetric ke...
Abstract—RSA encryption is one of the most well known algo-rithms for public-key cryptography. This ...
Abstract—Graphics processing units (GPUs) have become increasingly popular over the last years as a ...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
International audienceWe present below our first implementation results on a modular arithmetic libr...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
RSA is a public key cryptography widely used for end-to-end authentication and key exchange in vario...
Click on the DOI link to access the article (may not be free).In the field of cryptography, public k...
The reader will be familiar with selected concepts of cryptography consited in this work. AES algori...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
Orientador: Diego de Freitas AranhaDissertação (mestrado) - Universidade Estadual de Campinas, Insti...
International audienceData confidentiality is one of the most critical security services. Many encry...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
GPU is widely used in various applications that require huge computational power. In this paper, we ...
In the field of cryptography, public key algorithms are widely known to be slower than symmetric ke...
Abstract—RSA encryption is one of the most well known algo-rithms for public-key cryptography. This ...
Abstract—Graphics processing units (GPUs) have become increasingly popular over the last years as a ...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
International audienceWe present below our first implementation results on a modular arithmetic libr...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
RSA is a public key cryptography widely used for end-to-end authentication and key exchange in vario...
Click on the DOI link to access the article (may not be free).In the field of cryptography, public k...
The reader will be familiar with selected concepts of cryptography consited in this work. AES algori...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
Orientador: Diego de Freitas AranhaDissertação (mestrado) - Universidade Estadual de Campinas, Insti...
International audienceData confidentiality is one of the most critical security services. Many encry...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
GPU is widely used in various applications that require huge computational power. In this paper, we ...