2015
DOI: 10.21501/21454086.1633
|View full text |Cite
|
Sign up to set email alerts
|

Paralelización del Algoritmo Criptográfico GOST Empleando el Paradigma de Memoria Compartida

Abstract: Resumen. El artículo refi ere el proceso de paralelización del algoritmo criptográfi co GOST. La investigación realizada persigue como objetivo, reducir el tiempo de ejecución del algoritmo. El estudio no se encuentra enfocado al análisis de fortaleza del algoritmo criptográfi co; donde se hace énfasis es en el método empleado para disminuir el tiempo de ejecución de los procesos cifre y descifre. Para ello se realiza un diseño paralelo basado en la metodología de Lan Foster, el cual es aplicado a dos implemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…A cryptographic algorithm is characterised by converting a clear text into another, so-called cipher text. The content of the information is the same as above but can only be understood by the authorised person (Fulgueira-Camilo, Hernández-Duany, & Henry-Fuenteseca, 2015).…”
Section: Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…A cryptographic algorithm is characterised by converting a clear text into another, so-called cipher text. The content of the information is the same as above but can only be understood by the authorised person (Fulgueira-Camilo, Hernández-Duany, & Henry-Fuenteseca, 2015).…”
Section: Cryptographymentioning
confidence: 99%
“…Garcia Belmont (2016) raise awareness of the state of technology use and the alternatives for making a secure connection, as well as the importance of protecting your information. Fulgueira-Camilo et al (2015) refer to the parallelisation process of the GOST cryptographic algorithm. Palacios & Delgado (2006) describe the cryptographic algorithms most commonly used today to protect information in electronic form.…”
Section: State Of the Artmentioning
confidence: 99%