An Optimization of Tree Topology Based Parallel Cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Optimization of Tree Topology Based Parallel Cryptography

Public key cryptography has become of vital importance regarding the rapid development of wireless technologies. The RSA is one of themost important algorithms for secure communications in public-key cryptosystems. Since the RSA is expensive in terms of computational task which is modular exponentiation, parallel processing and architecture is a reasonable solution to speedup RSA operations. In...

متن کامل

Topology optimization using PETSc: An easy-to-use, fully parallel, open source topology optimization framework

This paper presents a flexible framework for parallel and easy-to-implement topology optimization using the Portable and Extendable Toolkit for Scientific Computing (PETSc). The presented framework is based on a standardized, and freely available library and in the published form it solves the minimum compliance problem on structured grids, using standard FEM and filtering techniques. For compl...

متن کامل

Isogeometric Topology Optimization of Continuum Structures using an Evolutionary Algorithm

Topology optimization has been an interesting area of research in recent years.  The main focus of this paper is to use an evolutionary swarm intelligence algorithm to perform Isogeometric Topology optimization of continuum structures.  A two-dimensional plate is analyzed statically and the nodal displacements are calculated.  The nodal displacements using Isogeometric analysis are found to be ...

متن کامل

Parallel Optimality Criteria-based Topology Optimization for Minimum Compliance Design

Topology optimization is often used in the conceptual design stage as a preprocessing tool to obtain overall material distribution in the solution domain. The resulting topology is then used as an initial guess for shape optimization. It is always desirable to use fine computational grid to obtain high-resolution layouts that minimize the need for shape optimization and post processing [1], but...

متن کامل

Farfalle: parallel permutation-based cryptography

In this paper, we introduce Farfalle, a newmode for building a pseudorandom function (PRF) from a b-bit cryptographic permutation. The constructed PRF takes as input a b-bit key and a sequence of variable-length data strings, and it generates a variable-length output. It consists of a compression layer and an expansion layer, each of them involving the parallel application of the permutation. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematical Problems in Engineering

سال: 2012

ISSN: 1024-123X,1563-5147

DOI: 10.1155/2012/871091