Investigation of parallel data processing using hybrid high performance CPU+ GPU systems and CUDA streams

P Czarnul - Computing and informatics, 2020 - cai.sk
The paper investigates parallel data processing in a hybrid CPU+ GPU (s) system using
multiple CUDA streams for overlap** communication and computations. This is crucial for …

Analysis of GPGPU-based brute-force and dictionary attack on SHA-1 password hash

R Saputra, B Noranita - 2019 3rd International Conference on …, 2019 - ieeexplore.ieee.org
Password data in a system usually stored in hash. Various human-caused negligence and
system vulnerability can make those data fall in the hand of those who isn't entitled to or …

[PDF][PDF] Modified honey encryption scheme for encoding natural language message

AE Omolara, A Jantan - International Journal of Electrical and …, 2019 - researchgate.net
Conventional encryption schemes are susceptible to brute-force attacks. This is because
bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a …

AMRC: an algebraic model for reconfiguration of high performance cluster computing systems at runtime

E Mousavi Khaneghah, M Sharifi - The Journal of Supercomputing, 2014 - Springer
Abstract High Performance Cluster Computing Systems (HPCSs) represent the best
performance because their configuration is customized regarding the features of the …

Flexible data authentication evaluated for the smart grid

K Cairns, C Hauser, T Gamage - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
This paper explores Time-Valid One-Time-Signature (TV-OTS) as a data authentication
protocol for potential use in smart grid applications. TV-OTS is highly configurable with …

A Novel GPU-Based Implementation of the Cube Attack: Preliminary Results Against Trivium

M Cianfriglia, S Guarino, M Bernaschi… - … Conference on Applied …, 2017 - Springer
With black-box access to the cipher being its unique requirement, Dinur and Shamir's cube
attack is a flexible cryptanalysis technique which can be applied to virtually any cipher …

A hybrid CPU/GPU cluster for encryption and decryption of large amounts of data

E Niewiadomska-Szynkiewicz, M Marks… - Journal of …, 2012 - yadda.icm.edu.pl
The main advantage of a distributed computing system over standalone computer is an
ability to share the workload between cores, processors and computers. In our paper we …

[KNJIGA][B] Secure volunteer computing for distributed cryptanalysis

N Kopal - 2018 - books.google.com
Volunteer computing offers researchers and developers the possibility to distribute their
huge computational jobs to the computers of volunteers. So, most of the overall cost for …

Cryptanalysis on GPUs with the cube attack: design, optimization and performances gains

M Cianfriglia, S Guarino - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
The cube attack is a flexible cryptanalysis technique, with a simple and fascinating
theoretical implant. It combines offline exhaustive searches over selected tweakable …

Using shared memory as a cache in high performance cellular automata water flow simulations

P Topa, P Młocek - Computer Science, 2013 - journals.agh.edu.pl
Graphics processors (GPU--Graphic Processor Units) recently have gained a lot of interest
as an efficient platform for general-purpose computation. Cellular Automata approach which …