You are in the accessibility menu

Please use this identifier to cite or link to this item: http://acervodigital.unesp.br/handle/11449/72665
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDetomini, Renan Correa-
dc.contributor.authorLobato, Renata Spolon-
dc.contributor.authorLobato, Renata Spolon-
dc.contributor.authorCavenaghi, Marcos Antônio-
dc.date.accessioned2014-05-27T11:26:00Z-
dc.date.accessioned2016-10-25T18:34:28Z-
dc.date.available2014-05-27T11:26:00Z-
dc.date.available2016-10-25T18:34:28Z-
dc.date.issued2011-09-12-
dc.identifierhttp://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5974171-
dc.identifier.citationProceedings of the 6th Iberian Conference on Information Systems and Technologies, CISTI 2011.-
dc.identifier.urihttp://hdl.handle.net/11449/72665-
dc.identifier.urihttp://acervodigital.unesp.br/handle/11449/72665-
dc.description.abstractIn this article we explore the NVIDIA graphical processing units (GPU) computational power in cryptography using CUDA (Compute Unified Device Architecture) technology. CUDA makes the general purpose computing easy using the parallel processing presents in GPUs. To do this, the NVIDIA GPUs architectures and CUDA are presented, besides cryptography concepts. Furthermore, we do the comparison between the versions executed in CPU with the parallel version of the cryptography algorithms Advanced Encryption Standard (AES) and Message-digest Algorithm 5 (MD5) wrote in CUDA. © 2011 AISTI.en
dc.language.isopor-
dc.sourceScopus-
dc.subjectcryptography-
dc.subjectCUDA-
dc.subjectGPU-
dc.subjectparallel algorithms-
dc.subjectAdvanced Encryption Standard-
dc.subjectComputational power-
dc.subjectCompute unified device architectures-
dc.subjectCryptography algorithms-
dc.subjectGeneral-purpose computing-
dc.subjectGraphical processing units-
dc.subjectParallel processing-
dc.subjectParallel version-
dc.subjectAlgorithms-
dc.subjectData privacy-
dc.subjectInformation systems-
dc.subjectProgram processors-
dc.subjectCryptography-
dc.titleUsing GPU to exploit parallelism on cryptographyen
dc.typeoutro-
dc.contributor.institutionUniversidade Estadual Paulista (UNESP)-
dc.description.affiliationDepartamento de Ciências de Computação e Estatística Universidade Estadual Paulista, São José do Rio Preto-
dc.description.affiliationDepartamento de Computação FC Universidade Estadual Paulista, Bauru-
dc.description.affiliationUnespDepartamento de Ciências de Computação e Estatística Universidade Estadual Paulista, São José do Rio Preto-
dc.description.affiliationUnespDepartamento de Computação FC Universidade Estadual Paulista, Bauru-
dc.rights.accessRightsAcesso restrito-
dc.relation.ispartofProceedings of the 6th Iberian Conference on Information Systems and Technologies, CISTI 2011-
dc.identifier.scopus2-s2.0-80052511832-
Appears in Collections:Artigos, TCCs, Teses e Dissertações da Unesp

There are no files associated with this item.
 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.