Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Investigation of parallel data processing using hybrid high performance CPU+ GPU systems and CUDA streams
P Czarnul - Computing and informatics, 2020 - cai.sk
The paper investigates parallel data processing in a hybrid CPU+ GPU (s) system using
multiple CUDA streams for overlap** communication and computations. This is crucial for …
multiple CUDA streams for overlap** communication and computations. This is crucial for …
Analysis of GPGPU-based brute-force and dictionary attack on SHA-1 password hash
Password data in a system usually stored in hash. Various human-caused negligence and
system vulnerability can make those data fall in the hand of those who isn't entitled to or …
system vulnerability can make those data fall in the hand of those who isn't entitled to or …
[PDF][PDF] Modified honey encryption scheme for encoding natural language message
Conventional encryption schemes are susceptible to brute-force attacks. This is because
bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a …
bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a …
AMRC: an algebraic model for reconfiguration of high performance cluster computing systems at runtime
Abstract High Performance Cluster Computing Systems (HPCSs) represent the best
performance because their configuration is customized regarding the features of the …
performance because their configuration is customized regarding the features of the …
Flexible data authentication evaluated for the smart grid
K Cairns, C Hauser, T Gamage - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
This paper explores Time-Valid One-Time-Signature (TV-OTS) as a data authentication
protocol for potential use in smart grid applications. TV-OTS is highly configurable with …
protocol for potential use in smart grid applications. TV-OTS is highly configurable with …
A Novel GPU-Based Implementation of the Cube Attack: Preliminary Results Against Trivium
With black-box access to the cipher being its unique requirement, Dinur and Shamir's cube
attack is a flexible cryptanalysis technique which can be applied to virtually any cipher …
attack is a flexible cryptanalysis technique which can be applied to virtually any cipher …
A hybrid CPU/GPU cluster for encryption and decryption of large amounts of data
The main advantage of a distributed computing system over standalone computer is an
ability to share the workload between cores, processors and computers. In our paper we …
ability to share the workload between cores, processors and computers. In our paper we …
[KNJIGA][B] Secure volunteer computing for distributed cryptanalysis
N Kopal - 2018 - books.google.com
Volunteer computing offers researchers and developers the possibility to distribute their
huge computational jobs to the computers of volunteers. So, most of the overall cost for …
huge computational jobs to the computers of volunteers. So, most of the overall cost for …
Cryptanalysis on GPUs with the cube attack: design, optimization and performances gains
M Cianfriglia, S Guarino - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
The cube attack is a flexible cryptanalysis technique, with a simple and fascinating
theoretical implant. It combines offline exhaustive searches over selected tweakable …
theoretical implant. It combines offline exhaustive searches over selected tweakable …
Using shared memory as a cache in high performance cellular automata water flow simulations
P Topa, P Młocek - Computer Science, 2013 - journals.agh.edu.pl
Graphics processors (GPU--Graphic Processor Units) recently have gained a lot of interest
as an efficient platform for general-purpose computation. Cellular Automata approach which …
as an efficient platform for general-purpose computation. Cellular Automata approach which …