In the field of cryptography, public key algorithms are widely known to be slower than symmetric key alternatives for the reason of their basis in modular arithmetic. The modular arithmetic in e.g. RSA and Diffie Hellman is computationally heavy when compared to symmetric algorithms relying on simple operations like shifting of bits and XOR. Therefore, how to make a more efficient and faster implementation of public key algorithms is publicly concerned. With the development of the GPGPU (General-purpose computing on graphics processing units) field, more and more computing problems are solved by using the parallel property of GPU (Graphics Processing Unit). CUDA (Compute Unified Device Architecture) is a framework which makes the GPGPU more...
Modern graphic processing units (GPU) are powerful parallel processing multi-core devices that are f...
Maintaining the privacy and security of people information are two most important principles of elec...
87 p. : ill. ; 30 cmThis work consists to implement IP cores dedicated to cryptography, using an FPG...
In the field of cryptography, public key algorithms are widely known to be slower than symmetric ke...
Abstract—Graphics processing units (GPUs) have become increasingly popular over the last years as a ...
Problem description: Most public key algorithms are based on modular arithmetic. The simplest, and o...
International audienceWe present below our first implementation results on a modular arithmetic libr...
Click on the DOI link to access the article (may not be free).In the field of cryptography, public k...
Cryptography, the science of writing secrets, has been used for centuries to conceal information fro...
This thesis is about parallel programming. In the first part of the thesis is compared speed of func...
The future of computation is the GPU, i.e. the Graphical Processing Unit. The graphics cards have sh...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
Modern-day computer security relies heavily on cryptography as a means to protect the data that we h...
Evaluating non-linear multivariate polynomial systems over finite fields is an important subroutine ...
Abstract — GPU based on CUDA Architecture developed by NVIDIA is a high performance computing device...
Modern graphic processing units (GPU) are powerful parallel processing multi-core devices that are f...
Maintaining the privacy and security of people information are two most important principles of elec...
87 p. : ill. ; 30 cmThis work consists to implement IP cores dedicated to cryptography, using an FPG...
In the field of cryptography, public key algorithms are widely known to be slower than symmetric ke...
Abstract—Graphics processing units (GPUs) have become increasingly popular over the last years as a ...
Problem description: Most public key algorithms are based on modular arithmetic. The simplest, and o...
International audienceWe present below our first implementation results on a modular arithmetic libr...
Click on the DOI link to access the article (may not be free).In the field of cryptography, public k...
Cryptography, the science of writing secrets, has been used for centuries to conceal information fro...
This thesis is about parallel programming. In the first part of the thesis is compared speed of func...
The future of computation is the GPU, i.e. the Graphical Processing Unit. The graphics cards have sh...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
Modern-day computer security relies heavily on cryptography as a means to protect the data that we h...
Evaluating non-linear multivariate polynomial systems over finite fields is an important subroutine ...
Abstract — GPU based on CUDA Architecture developed by NVIDIA is a high performance computing device...
Modern graphic processing units (GPU) are powerful parallel processing multi-core devices that are f...
Maintaining the privacy and security of people information are two most important principles of elec...
87 p. : ill. ; 30 cmThis work consists to implement IP cores dedicated to cryptography, using an FPG...