Until now, most cryptography implementations on parallel architectures have focused on adapting the software to SIMD architectures initially meant for media applications. In this ...
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
Multiple-Phased Systems, whose operational life can be partitioned in a set of disjoint periods, called “phases”, include several classes of systems such as Phased Mission Sys...
Andrea Bondavalli, Ivan Mura, Silvano Chiaradonna,...
Peer-to-Peer (P2P) computing is said to be the next wave of computing after client-server and web-based computing. It provides an opportunity to harness a lot of idle peer-resource...
Tan Tien Ping, Gian Chand Sodhy, Chan Huah Yong, F...
We want to achieve efficiency for the exact computation of the dot product of two vectors over word size finite fields. We therefore compare the practical behaviors of a wide range...