Buscar
Mostrando ítems 1-10 de 745
Using GPU to exploit parallelism on cryptography
(2011-09-12)
In this article we explore the NVIDIA graphical processing units (GPU) computational power in cryptography using CUDA (Compute Unified Device Architecture) technology. CUDA makes the general purpose computing easy using ...
Using GPU to exploit parallelism on cryptography
(2011-09-12)
In this article we explore the NVIDIA graphical processing units (GPU) computational power in cryptography using CUDA (Compute Unified Device Architecture) technology. CUDA makes the general purpose computing easy using ...
Cryptography of the future
(Escuela Superior de Guerra Conjunta de las Fuerzas Armadas, 2013)
Cryptography of the future
(Escuela Superior de Guerra Conjunta de las Fuerzas Armadas, 2013)
TEACHING BASIC CONCEPTS OF CRYPTOGRAPHY IN PROFESSIONAL HIGH SCHOOL
(Unesp-faculdade Ciencias & Letras, 2021-05-01)
The cryptography is present in several operations performed daily by people, such as online shopping or in dialogues using computer equipment and the Internet as a proxy. Although cryptography is very important in the ...
Criptografia em uma abordagem elementar
(Universidade Federal de São CarlosUFSCarPrograma de Pós-Graduação em Ensino de Ciências Exatas - PPGECECâmpus São Carlos, 2021-08-05)
This work succinctly presents historical and mathematical aspects of ancient and modern cryptography such as Caesar cipher, related ciphers, Vigenère cipher, Hill cipher and RSA cryptography. Guidance on the subject of ...
Mining Cryptography Misuse In Online Forums
(IEEE Computer SocLos Alamitos, 2016)
An IND-CCA Rank Metric Encryption Scheme Implementation
(Florianópolis, SC., 2022)