?
Implementation of an XSL block cipher with MDS-matrix linear transformation on NVIDIA CUDA
Математические вопросы криптографии. 2015. Vol. 6. No. 2. P. 99-108.
In this article we consider NVIDIA GPU implementation aspects of an XSL block cipher over the finite field with MDS-matrix linear transformation. We compare obtained results with some other block ciphers.
Fomin D., Математические вопросы криптографии 2016 Vol. 7 No. 2 P. 121-130
A timing attack against an AES-type block cipher CUDA implementa- tion is presented. Our experiments show that it is possible to extract a secret AES 128-bit key with complexity of 2^32 chosen plaintext encryptions. This approach may be applied to AES with other key sizes and, moreover, to any block cipher with a linear transform that is ...
Added: May 4, 2019
Gostev I. M., Sibirtseva E. A., RUDN Journal of Mathematics, Information Sciences and Physics 2014 No. 4 P. 68-84
Low-cost gaze tracking systems are in great demand due to their wide range of application. Commonly, extra devices are needed (for instance, head mounted cameras); however, in this investigation gaze tracking is performed in real-time based on the video stream from an infrared video camera. A comparative analysis of the existing analogues was executed and ...
Added: December 7, 2014
Oleg E. Bukharov, Dmitry P. Bogolyubov, Expert Systems with Applications 2015 Vol. 42 No. 15-16 P. 6177-6183
Given ever increasing information volume and complexity of engineering, social and economic systems, it has become more difficult to assess incoming data and manage such systems properly. Currently developed innovative decision support systems (DSS) aim to achieve optimum results while minimizing the risks of serious losses. The purpose of the DSS is to help the ...
Added: May 17, 2015
Avdoshin S. M., Набебин А. А., М. : ДМК Пресс, 2017
The textbook contains necessary information about universal and classical algebras, systems of axioms for the basic algebraic structures (groupoid, monoid, semi-groups, groups, partial orders, rings, fields). The basic cryptographic algorithms are described. Error-correcting codes - linear, cyclic, BCH are considered. Algorithms for designing of such codes are given. Many examples are shown. It is put ...
Added: August 19, 2016
Bogolyubov D., Чанкин А. А., Стемиковская К. В., Промышленные АСУ и контроллеры 2012 № 10 С. 30-35
In this article we introduce a CUDA-based implementation of Kohonen self-organizing map. We describe software implementation and test results confirming performance growth with increasing size of neural network comparative to serial version of algorithm. ...
Added: February 13, 2013
Bukharov O., Bogolyubov D., Системный администратор 2014 № 9 С. 88-92
This paper describes aspects of development of decision support system based on neural networks and a genetic algorithm. We justify the use of general-purpose computing on graphics processing units (GPGPU) for our decision support system. Example of CUDA successful application to increase computing performance of the system in question is presented. ...
Added: September 12, 2014
Lebedev P. A., Journal of Physics: Conference Series 2016 Vol. 681 No. 1 P. 012048-1-012048-6
We present results on integration of two major GPGPU APIs with reactor-based event processing model in C++ that utilizes coroutines. With current lack of universally usable GPGPU programming interface that gives optimal performance and debates about the style of implementing asynchronous computing in C++, we present a working implementation that allows a uniform and seamless ...
Added: February 3, 2016
Bukharov O., Mizikin A. A., Bogolyubov D., Промышленные АСУ и контроллеры 2013 № 7 С. 37-45
In this article we ground some advantages of the evolutionary approach to the solution of problems of decision support system development. The most popular methods of forecasting and detection of dependences are considered. Advantages of use of neural networks to forecast and to determine of dependences between parameters of systems are given. Advantages of interval ...
Added: November 29, 2013
Бараш Л. Ю., Shchur L., Cuda Альманах 2014 № 3 С. 17-17
Libraries RNGSSELIB и PRAND for the parallel generation of pseudo-random numbers in Monte Carlo simulations was developed. RNGSSELIB library contains realization based on the SSE extensionin the modern CPU, and PRAND library contains the generators using CUDA version 5.0 and later. ...
Added: March 10, 2016
Lebedev P. A., Вестник Московского государственного технического университета им. Н.Э. Баумана. Серия Естественные науки 2013 № 1 (48) С. 50-60
An approach is described to implementation of the Method of Four Russians for reducing the dense matrices over GF(2) to row echelon form using the NVIDIA CUDA platform. Estimates of the algorithm running time and recommendations on choosing the algorithm parameters are given. It is shown that the developed implementation is most effective in comparison ...
Added: April 1, 2013
Nolde D., Krylov N., Телегин П. Н. et al., Труды НИИСИ РАН 2018 Т. 7 № 4 С. 157-161
The performance of molecular dynamics software package Gromacs was measured on various
hardware: desktop computers, clusters based on x84_64 processors or many integrated core processors, and
heterogeneous system with gaming graphic cards or general purpose GPU systems. The optimal choice of hardware
for molecular dynamics simulations is discussed. ...
Added: February 10, 2020
Lebedev P. A., Математические вопросы криптографии 2013 Vol. 4 No. 2 P. 73-80
We present optimization guidelines and implementations of cryptographic hash functions GOST R 34.11-94 and GOST R 34.11-2012. Results for x86_64 CPUs and NVIDIA CUDA-capable GPUs are provided for our and several other well-known implementations. It is shown that the new standard may be twice as fast as the old one on modern CPUs, but it ...
Added: April 1, 2013
Lebedev P. A., Nesterenko A., Системы высокой доступности 2013 Т. 9 № 3 С. 6-13
We present a new authenticated encryption mode which can be used with arbitrary block cipher. The key property of this mode is that the length of authentication code can be twice as big as the block size of the cipher used. We provide estimates on the difficulty of constructing a collision and present performance results ...
Added: October 27, 2013
Borovský M., Weigel M., Barash L.Yu. et al., EPJ Web of Conferences 2016 Vol. 108 P. 02016-p.1-02016-p.6
The population annealing algorithm is a novel approach to study systems with rough free-energy landscapes, such as spin glasses. It combines the power of simulated annealing, Boltzmann weighted differential reproduction and sequential Monte Carlo process to bring the population of replicas to the equilibrium even in the low-temperature region. Moreover, it provides a very good ...
Added: January 31, 2018
El-Fakih K., Barlas G., Ali M. et al., International Journal of Parallel, Emergent and Distributed Systems 2018 Vol. 33 No. 2 P. 197-210
Many approaches have been proposed for deriving tests from finite state machine (FSM) specifications with respect to some established coverage criteria. A fundamental core problem in FSM-based testing relates to the derivation of input sequences that can distinguish states of an FSM specification, aka distinguishing sequences. A major effort in the construction of these sequences ...
Added: October 31, 2018
Авраамова О. Д., Fomin D., Серов В. А. et al., Математические вопросы криптографии 2021 Vol. 12 No. 2 P. 21-38
In this paper we consider a bit-sliced implementation of the non-linear transformation shared by GOST R 34.12-2015 “Kuznyechik” block cipher and GOST R 34.11-2012 “Streebog” hash function. We combine analytical and computer methods to get a 226 Boolean operations representation. ...
Added: July 26, 2021
Russkov A., Chulkevich R., Shchur L., Computer Physics Communications 2021 Vol. 261 P. 107786
The population annealing method is a promising approach for large-scale simulations because it is potentially scalable on any parallel architecture. We present an implementation of the algorithm on a hybrid program architecture combining CUDA and MPI. The problem is to keep all general-purpose graphics processing unit devices as busy as possible by efficiently redistributing replicas. ...
Added: December 28, 2020
Russkov A., Roman Chulkevich, Shchur L., / Cornell University. Series arXiv "math". 2020. No. 2006.00561.
The parallel annealing method is one of the promising approaches for large scale simulations as potentially scalable on any parallel architecture. We present an implementation of the algorithm on the hybrid program architecture combining CUDA and MPI. The problem is to keep all general-purpose graphics processing unit devices as busy as possible redistributing replicas and ...
Added: June 2, 2020
Kondratyuk N., Nikolskiy V., Pavlov D. et al., International Journal of High Performance Computing Applications 2021 Vol. 35 No. 4 P. 312-324
Classical molecular dynamics (MD) calculations represent a significant part of the utilization time of high-performance computing systems. As usual, the efficiency of such calculations is based on an interplay of software and hardware that are nowadays moving to hybrid GPU-based technologies. Several well-developed open-source MD codes focused on GPUs differ both in their data management ...
Added: June 25, 2021
Perov A., Пестунов А. И., Прикладная дискретная математика 2020 № 3 С. 46-56
The paper explores possibility of applying convolutional neural networks to the security analysis of iterative block ciphers. A new approach for constructing distinguishing
attacks based on a convolutional neural network is proposed. The approach is based
on distinguishing between graphic equivalents of ciphertexts received by the CTR
(counter) encryption mode after different number of rounds, including the number
of ...
Added: November 1, 2021
М. : Издательский центр «Российский государственный гуманитарный университет», 2019
Сборник включает 27 докладов международной конференции по компьютерной лингвистике и интеллектуальным технологиям «Диалог 2019», не вошедшие в ежегодник «Компьютерная лингвистика и интеллектуальные технологии», но рекомендованные Программным Комитетом к представлению на конференции. Для специалистов в области теоретической и прикладной лингвистики и интеллектуальных технологий. ...
Added: December 10, 2019
Karpov V. E., Karpova I. P., Procedia Engineering 2015 Vol. 100 P. 1459-1468
Work solutions are proposed for problems of leader definition and role distribution in homogeneous groups of robots. It is shown that transition from a swarm to a collective of robots with hierarchical organization is possible using exclusively local interaction. The local revoting algorithm is central to the procedure for choice of leader while redistribution of roles can ...
Added: March 14, 2015
Chernyshev S. V., Cherepanov E. A., Pankratiev E. V. et al., Journal of Mathematical Sciences 2005 Vol. 128 No. 6 P. 3487-3495
Added: January 27, 2014
Chuprikov P., Nikolenko S. I., Davydow A. et al., IEEE Transactions on Networking 2018 Vol. 26 No. 1 P. 342-355
Modern network elements are increasingly required to deal with heterogeneous traffic. Recent works consider processing policies for buffers that hold packets with different processing requirements (number of processing cycles needed before a packet can be transmitted out) but uniform value, aiming to maximize the throughput, i.e., the number of transmitted packets. Other developments deal with ...
Added: March 14, 2018