This thesis is about parallel programming. In the first part of the thesis is compared speed of functions modular exponentiation from various C/C++ libraries for CPU. In the second part is transformed the LibTomMath library from CPU to GPU CUDA technology. For devices CPU and GPU is compared speed of processing the operation of modular exponentiation from modified library. In conclusion are created two applications “Client –Server” for computing the revocation function of the protocol HM12
87 p. : ill. ; 30 cmThis work consists to implement IP cores dedicated to cryptography, using an FPG...
Abstract — Tiled architectures are emerging as an architectural platform that allows high levels of ...
This paper addresses issues associated with distributed computing systems andthe application of mixe...
In the field of cryptography, public key algorithms are widely known to be slower than symmetric key...
The title of this work is “Parallel algorithms in cryptoanalysis”. The main idea of this individual ...
In the digital world, the demand for data security during communication has increased. Hash function...
The growing diffusion of heterogeneous Cyber-Physical Systems (CPSs) poses a problem of security. Th...
Abstract:- This paper presents a complex project that aims the development and design of a parallel ...
The goal of this thesis is to analyze the technologies for distributed computing in password crackin...
AbstractThe modular exponentiation operation of the current algorithms for asymmetric cryptography i...
The requirement of information security on network has become more and more important. Cryptography ...
Society is undergoing a paradigm shift where the Information and Communication Technology (ICT) revo...
The modular exponentiation operation of the current algorithms for asymmetric cryptography is the mo...
International audienceWe present below our first implementation results on a modular arithmetic libr...
The text of this thesis deals with techniques of parallel processing calculations. It is an analysis...
87 p. : ill. ; 30 cmThis work consists to implement IP cores dedicated to cryptography, using an FPG...
Abstract — Tiled architectures are emerging as an architectural platform that allows high levels of ...
This paper addresses issues associated with distributed computing systems andthe application of mixe...
In the field of cryptography, public key algorithms are widely known to be slower than symmetric key...
The title of this work is “Parallel algorithms in cryptoanalysis”. The main idea of this individual ...
In the digital world, the demand for data security during communication has increased. Hash function...
The growing diffusion of heterogeneous Cyber-Physical Systems (CPSs) poses a problem of security. Th...
Abstract:- This paper presents a complex project that aims the development and design of a parallel ...
The goal of this thesis is to analyze the technologies for distributed computing in password crackin...
AbstractThe modular exponentiation operation of the current algorithms for asymmetric cryptography i...
The requirement of information security on network has become more and more important. Cryptography ...
Society is undergoing a paradigm shift where the Information and Communication Technology (ICT) revo...
The modular exponentiation operation of the current algorithms for asymmetric cryptography is the mo...
International audienceWe present below our first implementation results on a modular arithmetic libr...
The text of this thesis deals with techniques of parallel processing calculations. It is an analysis...
87 p. : ill. ; 30 cmThis work consists to implement IP cores dedicated to cryptography, using an FPG...
Abstract — Tiled architectures are emerging as an architectural platform that allows high levels of ...
This paper addresses issues associated with distributed computing systems andthe application of mixe...