Parallelization of Encryption Algorithms using MPI
Abstract
Full Text:
PDFReferences
Stallings, W. (2006). Cryptography and network security, 4/E. Pearson Education India.
Beletskyy, V., & Burak, D. (2005). Parallelization of the data encryption standard (DES) algorithm. In Enhanced methods in computer security, biometric and artificial intelligence systems (pp. 23-33). Springer, Boston, MA.
Niederhagen, R. F. (2012). Parallel cryptanalysis.
Das, D., & Ray, A. (2010). A parallel encryption algorithm for block ciphers based on reversible programmable cellular automata. arXiv preprint arXiv:1006.2822.
Alaidaros, H. M., Rasid, M. F. A., Othman, M., & Abdullah, R. S. A. R. (2007, May). Enhancing security performance with parallel crypto operations in ssl bulk data transfer phase. In 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications (pp. 129-133). IEEE.
Manikandan, G., Sairam, N., & Kamarasan, M. (2012). A new approach for improving data security using iterative blowfish algorithm. Research Journal of Applied Sciences, Engineering and Technology, 4(6), 603-607.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.
Amato, N. M., Iyer, R., Sundaresan, S., & Wu, Y. (1996). A comparison of parallel sorting algorithms on different architectures. Technical Report TR98-029, Department of Computer Science, Texas A&M University.
Schneier, B. (1993, December). Description of a new variable-length key, 64-bit block cipher (Blowfish). In International Workshop on Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg.
McGrew, D. A. (2002). Counter mode security: Analysis and recommendations. Cisco Systems, November, 2(4).
DOI: http://dx.doi.org/10.21015/vtm.v8i1.577
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.