Paper compares possibility to parallelize two cryptographic algorithms: Xor cipher and MD5 collision search. Presented solutions allows user to specify number of used processors. Performance of algorithms where tested on a different types of processors and visualized on graphs.W artykule zostały porównane możliwości zrównoleglenia dwóch algorytmów z dziedziny kryptografii: szyfrowania XOR oraz wyszukiwania kolizji funkcji skrótu MD5. Prezentowane rozwiązania zostały zaimplementowane w taki sposób, by używały wybraną przez użytkownika liczbę rdzeni procesora. Wydajność algorytmów została sprawdzona na różnych procesorach i przedstawiona na wykresach
The article presents the analysis of available solutions of transmissions in laparoscopic tools. The...
Nowadays processors working in personal computers and mobile devices allow for more and more effecti...
Fault management is an expensive process and analyzing data manually requires a lot of resources. Mo...
Paper compares possibility to parallelize two cryptographic algorithms: Xor cipher and MD5 collision...
The subject of this article is to compare iOS mobile operation system encryption algorithms performa...
The article presents a comparative analysis of selected algorithms for solving Sudoku. Puzzles of di...
The article presents selected solutions using CPU processors and GPUs for calculations in the Matlab...
The following article presents a comparison of multithread and multiprocess communication and synchr...
This paper discusses a new programming method - event driven programming. This method is compared wi...
The article describes major methodological problems associated with the study of online privacy mana...
Praca przedstawia główne wyniki z tematyki algorytmów tekstowych otrzymane w Katedrze Informatyki St...
The principles of the BlockChain technology used for creating bitcoins were shortly described. The S...
This article presents a comparison of the two hardware platforms in terms of Smart Home implementati...
Problem of optimization with limited resources is fundamental one in computer sciences. The bees alg...
The article presents contemporary issues in the field of digital currency. It analyzes the economic ...
The article presents the analysis of available solutions of transmissions in laparoscopic tools. The...
Nowadays processors working in personal computers and mobile devices allow for more and more effecti...
Fault management is an expensive process and analyzing data manually requires a lot of resources. Mo...
Paper compares possibility to parallelize two cryptographic algorithms: Xor cipher and MD5 collision...
The subject of this article is to compare iOS mobile operation system encryption algorithms performa...
The article presents a comparative analysis of selected algorithms for solving Sudoku. Puzzles of di...
The article presents selected solutions using CPU processors and GPUs for calculations in the Matlab...
The following article presents a comparison of multithread and multiprocess communication and synchr...
This paper discusses a new programming method - event driven programming. This method is compared wi...
The article describes major methodological problems associated with the study of online privacy mana...
Praca przedstawia główne wyniki z tematyki algorytmów tekstowych otrzymane w Katedrze Informatyki St...
The principles of the BlockChain technology used for creating bitcoins were shortly described. The S...
This article presents a comparison of the two hardware platforms in terms of Smart Home implementati...
Problem of optimization with limited resources is fundamental one in computer sciences. The bees alg...
The article presents contemporary issues in the field of digital currency. It analyzes the economic ...
The article presents the analysis of available solutions of transmissions in laparoscopic tools. The...
Nowadays processors working in personal computers and mobile devices allow for more and more effecti...
Fault management is an expensive process and analyzing data manually requires a lot of resources. Mo...