نتایج جستجو برای: coprocessor

تعداد نتایج: 1189  

2017
Keith Mayes

Many security protocols rely on authentication of communicating entities and encryption of exchanged data. Traditionally, authentication and encryption have been separate processes, however there are combined solutions, referred to as authenticated-encryption (AE). The payment card industry is revising its protocol specifications and considering AE, however there has been uncertainty around per...

2015
Andrey Vladimirov

Common techniques for fine-tuning the performance of automatically vectorized loops in applications for Intel Xeon Phi coprocessors are discussed. These techniques include strength reduction, regularizing the vectorization pattern, data alignment and aligned data hint, and pointer disambiguation. In addition, the loop tiling technique of memory traffic tuning is shown. The optimization methods ...

2010

This paper describes the goals and tradeoffs in the design of the MC68881 Floating Point Coprocessor. The Motorola MC68881 is a complete implementation of the proposed IEEE floating point standard on a single VLSI chip. It is a coprocessor for the MC68020 microprocessor and is a peripheral processor for other M68000 family processors. The design of the MC68881 was guided by a set of goals. This...

1999
Randy Heiland Pauline Baker

Coprocessing involves running a visualization process concurrently with a simulation, and making intermediate simulation results visible during the course of the run. Through computational monitoring, a researcher can watch the progress of a run, perhaps ending the run if it looks unproductive. In this report, we experiment with applying two software packages designed to support computational m...

1995
Gerald Friedl Marco Platzner Bernhard Rinner

2000
Peter Gutmann

Current crypto implementations rely on software running under general-purpose operating systems alongside a horde of untrusted applications, ActiveX controls, web browser plugins, mailers handling messages with embedded active content, and numerous other threats to security, with only the OS’s (often almost nonexistant) security to keep the two apart. This paper presents a general-purpose open-...

2013
Marcin Rogawski Kris Gaj Ekawat Homsirikamol

One of the five final SHA-3 candidates, Grøstl, has been inspired by the Advanced Encryption Standard. This unique feature can be exploited in a large variety of practical applications. In order to have a better picture of the Grøstl-AES computational efficiency (high-level scheduling, internal pipelining, resource sharing, etc.), we designed a high-speed coprocessor for the Grøstl-based HMAC a...

Journal: :Neural Parallel & Scientific Comp. 2010
Mostafa I. Soliman Ghada Y. Abozaid

In cryptography, the advanced encryption standard (AES) is an encryption standard issued as FIPS by NIST as a successor to data encryption standard (DES) algorithm. The applications of the AES are wide including any sensitive data that requires cryptographic protection before communication or storage. This paper proposes extending generalpurpose processors with crypto coprocessor based on decou...

Journal: :CoRR 2015
Timothy Dykes Claudio Gheller Marzia Rivi Mel Krokos

With the increasing size and complexity of data produced by large scale numerical simulations, it is of primary importance for scientists to be able to exploit all available hardware in heterogenous High Performance Computing environments for increased throughput and efficiency. We focus on the porting and optimization of Splotch, a scalable visualization algorithm, to utilize the Xeon Phi, Int...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید