Analysis of GPGPU-based brute-force and dictionary attack on SHA-1 password hash

R Saputra, B Noranita - 2019 3rd International Conference on …, 2019 - ieeexplore.ieee.org
Password data in a system usually stored in hash. Various human-caused negligence and
system vulnerability can make those data fall in the hand of those who isn't entitled to or …

Optimizing the performance of the advanced encryption standard techniques for secured data transmission

K Assa-Agyei, F Olajide, T Alade - International Journal of …, 2023 - ueaeprints.uea.ac.uk
Information security has emerged as a critical concern in data communications. The use of
cryptographic methods is one approach for ensuring data security. A cryptography …

Heterogeneous implementation of a voronoi cell-based svp solver

G Falcao, F Cabeleira, A Mariano, LP Santos - IEEE Access, 2019 - ieeexplore.ieee.org
This paper presents a new, heterogeneous CPU+ GPU attacks against lattice-based (post-
quantum) cryptosystems based on the Shortest Vector Problem (SVP), a central problem in …

Develo** models for the runtime of programs with exponential runtime behavior

M Burger, GN Nguyen, C Bischof - 2020 IEEE/ACM …, 2020 - ieeexplore.ieee.org
In this paper, we present a new approach to generate runtime models for programs whose
runtime grows exponentially with the value of one input parameter. Such programs are, eg …

SimAnMo—A parallelized runtime model generator

M Burger, GN Nguyen, C Bischof - … and Computation: Practice …, 2022 - Wiley Online Library
In this article, we present the novel features of the recent version of SimAnMo, the Simulated
Annealing Modeler. The tool creates models that correlate the size of one input parameter of …

A high speed implementation counter mode cryptography using hardware parallelism

S Najjar-Ghabel, S Yousefi… - 2016 Eighth International …, 2016 - ieeexplore.ieee.org
Nowadays, cryptography is one of the common security mechanisms. Cryptography
algorithms are used to make secure data transmission over unsecured networks. Vital …

An effective cipher block scheme based on cellular automata

S Molaei, S Najjar-Ghabel… - 2017 IEEE 4th …, 2017 - ieeexplore.ieee.org
Nowadays, security has become a fundamental concern of computer systems. This
requirement can be satisfied using encryption, which refers to protecting private information …

Advanced Environment Modelling for Remote Teleoperation to Improve Operator Experience

Y **, DAP Soto, JA Rossiter, SM Veres - Proceedings of the …, 2021 - dl.acm.org
This work presents a novel intelligent robot perception system, including a real-time, high-
quality, 3D scanning pipeline for texture-less scenes and a human-supervised gras** …