An Optimization of Tree Topology Based Parallel Cryptography
نویسندگان
چکیده
منابع مشابه
An Optimization of Tree Topology Based Parallel Cryptography
Public key cryptography has become of vital importance regarding the rapid development of wireless technologies. The RSA is one of themost important algorithms for secure communications in public-key cryptosystems. Since the RSA is expensive in terms of computational task which is modular exponentiation, parallel processing and architecture is a reasonable solution to speedup RSA operations. In...
متن کاملTopology optimization using PETSc: An easy-to-use, fully parallel, open source topology optimization framework
This paper presents a flexible framework for parallel and easy-to-implement topology optimization using the Portable and Extendable Toolkit for Scientific Computing (PETSc). The presented framework is based on a standardized, and freely available library and in the published form it solves the minimum compliance problem on structured grids, using standard FEM and filtering techniques. For compl...
متن کاملIsogeometric Topology Optimization of Continuum Structures using an Evolutionary Algorithm
Topology optimization has been an interesting area of research in recent years. The main focus of this paper is to use an evolutionary swarm intelligence algorithm to perform Isogeometric Topology optimization of continuum structures. A two-dimensional plate is analyzed statically and the nodal displacements are calculated. The nodal displacements using Isogeometric analysis are found to be ...
متن کاملParallel Optimality Criteria-based Topology Optimization for Minimum Compliance Design
Topology optimization is often used in the conceptual design stage as a preprocessing tool to obtain overall material distribution in the solution domain. The resulting topology is then used as an initial guess for shape optimization. It is always desirable to use fine computational grid to obtain high-resolution layouts that minimize the need for shape optimization and post processing [1], but...
متن کاملFarfalle: parallel permutation-based cryptography
In this paper, we introduce Farfalle, a newmode for building a pseudorandom function (PRF) from a b-bit cryptographic permutation. The constructed PRF takes as input a b-bit key and a sequence of variable-length data strings, and it generates a variable-length output. It consists of a compression layer and an expansion layer, each of them involving the parallel application of the permutation. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical Problems in Engineering
سال: 2012
ISSN: 1024-123X,1563-5147
DOI: 10.1155/2012/871091