Zobrazeno 1 - 10
of 76
pro vyhledávání: '"Pratap Pattnaik"'
Publikováno v:
Journal of The Institution of Engineers (India): Series D. 103:57-62
Publikováno v:
HASP@MICRO
The mathematical constructs, nature of computations and challenges in optimizing lattice post-quantum cryptographic algorithms on modern many-core processors are discussed in this paper. Identification of time-consuming functions and subsequent hardw
Autor:
Pratap Pattnaik, Manoj Kumar
Publikováno v:
HPEC
We discuss the Post Quantum Cryptography algorithms for key establishment under consideration by NIST for standardization. Three of these, Crystals- Kyber, Classic McEliece and Supersingular Isogeny based Key Encapsulation (SIKE), are representatives
Publikováno v:
ISPASS
Current public-key cryptography systems are vulnerable to quantum computing based attacks. Post-quantum cryptographic (PQC) schemes, based on mathematical paradigms such as lattice-based hard problems, are under consideration by NIST as quantum-safe
Autor:
Joefon Jann, Hao Yu, Gabriel Tanase, Manoj Kumar, José E. Moreira, Mauricio J. Serrano, William P. Horn, Pratap Pattnaik
Publikováno v:
International Journal of Parallel Programming. 46:412-440
Graph processing is becoming a crucial component for analyzing big data arising in many application domains such as social and biological networks, fraud detection, and sentiment analysis. As a result, a number of computational models for graph analy
Publikováno v:
HPEC
Attaining good performance on graph analytics applications on modern day many-core processors is challenging, because these processors have complex pipelines to manage out of order execution of hundreds of instructions in flight. These pipelines have
Publikováno v:
CF
Emerging applications in health-care, social media analytics, cyber-security, homeland security, and marketing require large graph analytics. Attaining good performance on these applications on modern day hardware is challenging because of the comple
Publikováno v:
IBM Journal of Research and Development. 59:1-4
Publikováno v:
Conf. Computing Frontiers
The replacement policies known as MIN and OPT are optimal for a two-level memory hierarchy. The computation of the cache content for these policies requires the off-line knowledge of the entire address trace. However, the stack distance of a given ac
Publikováno v:
IPDPS Workshops
Graph-based algorithms play a crucial role in workflows for analyzing large datasets in domains such as social networks, biology, fraud detection, and sentiment analysis. There are two approaches for incorporating graph-based algorithms into these wo