SIMD

Results: 305



#Item
1Cryptography / Cryptographic hash functions / NIST hash function competition / Flynn's taxonomy / Parallel computing / SIMD / SHA-3 / Hash function / Block cipher / MerkleDamgrd construction / One-way compression function

SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter: Ga¨etan Leurent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
2Cryptographic protocols / Mathematics / Secure multi-party computation / Linear algebra / Valuation / Linear combination / Finite field

Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2015-06-09 02:13:24
3Cryptography / NIST hash function competition / Cryptographic hash functions / MerkleDamgrd construction / SIMD / CubeHash / Hash function / SHA-3 / Block cipher

Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, and Gaëtan Leurent École Normale Supérieure – Département d’Informatique, 45 rue d’Ulm, 75230 Paris Cedex 05, France {Charles.Bouillaguet,Gaet

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
4Cryptography / Permutation / SIMD / Data Encryption Standard / Feistel cipher / Permutation polynomial / Block cipher

Tweaking SIMD Gaëtan Leurent, Pierre-Alain Fouque, Charles Bouillaguet École Normale Supérieure – Département d’Informatique, 45 rue d’Ulm, 75230 Paris Cedex 05, France {Gaetan.Leurent,Pierre-Alain.France,Charl

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
5

Efficient Implementation of Transform Based Audio Coders using SIMD Paradigm and Multifunction Computations Luckose Poondikulam S (), Suyog Moogi (), Rahul Kumar, K P P Kalyan Chakravart

Add to Reading List

Source URL: www.mp3-tech.org

Language: English - Date: 2009-06-28 10:52:19
    6

    Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

    Add to Reading List

    Source URL: www.cis.upenn.edu

    - Date: 2015-06-09 02:13:24
      7

      High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009 Stefan Tillich, Martin Feldhof

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2009-11-11 12:35:56
        8

        CS:APP3e Web Aside OPT:SIMD: Achieving Greater Parallelism with SIMD Instructions∗ Randal E. Bryant David R. O’Hallaron October 12, 2015

        Add to Reading List

        Source URL: csapp.cs.cmu.edu

        - Date: 2015-10-12 15:32:40
          9

          Vectorization for SIMD Architectures with Alignment Constraints Alexandre E. Eichenberger Peng Wu

          Add to Reading List

          Source URL: researcher.watson.ibm.com

          - Date: 2009-10-23 16:03:06
            10

            A General Technique for Creating SIMD Algorithms on Parallel Pointer-Based Quadtrees Thor Bestul Center for Automation Research University of Maryland, College Park, MD 20742

            Add to Reading List

            Source URL: mapcontext.com

            - Date: 2008-08-29 21:38:27
              UPDATE