Search Results - parallel technology ((evolution algorithm) OR (encryption algorithm))*
Search alternatives:
- parallel technology »
- evolution algorithm »
-
1
Implementation of a parallel XTS encryption mode of operation
Published 2014Get full text
Get full text
Get full text
Article -
2
-
3
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…Due to the promising prospect ofchaotic encryption in the field ofcryptography, and the lack ofimplementation ofthis new encryption-decryption algorithm, this project focuses on introducing a new symmetric encryption-decryption scheme based on a chaos system for VoIP.…”
Get full text
Get full text
Final Year Project -
4
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
Get full text
Get full text
Final Year Project -
5
Tranformation of CPU-based Applications To Leverage on Graphics Processors using CUDA
Published 2010“…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
Get full text
Get full text
Article -
6
Super Calculator using Compute Unified Device Architecture (CUDA)
Published 2009“…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
Get full text
Get full text
Final Year Project -
7
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
Get full text
Conference or Workshop Item -
8
CPU-based Application Transformation to CUDA: Transformation of CPU-based Applications To Leverage on Graphics Processors using CUDA
Published 2012“…Successful attempt at porting Serpent encryption algorithm and Lattice Boltzmann Method provided up to 7 times throughput performance gain and up to 10 times execution time performance gain respectively over the CPU. …”
Get full text
Get full text
Book -
9
Agro-ento bioinformation: towards the edge of reality
Published 2002“…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
Get full text
Get full text
Inaugural Lecture -
10
Recognizing complex human activities using hybrid feature selections based on an accelerometer sensor
Published 2017“…Wearable sensor technology is evolving in parallel with the demand for human activity monitoring applications. …”
Get full text
Get full text
Article -
11
An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics
Published 2016“…A careful analysis of the algorithm and efficient utilization of Zynq resources results in highly parallelized and pipelined architecture outperforms the state-of-the-art. …”
Get full text
Get full text
Thesis
