A comparison of computer-based technologies suitable for cryptographic attacks

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Developed initially for tasks related to computer graphics, GPUs are increasingly being used for general purpose processing, including scientific and engineering applications. In this contribution, we have analysed the performance of three graphics cards that belong to the parallel computing CUDA platform with two C++ and Java multithreading implementations, using as an example of computation a bruteforce attack on KeeLoq, one of the best known remote keyless entry applications. As it was expected, these implementations are not able to break algorithms with 64-bit keys, but the results allow us to provide valuable information regarding the compared capabilities of the tested platforms.

Cite

CITATION STYLE

APA

Gayoso Martínez, V., Hernández Encinas, L., Martín Mu Ñoz, A., Martínez-Graullera, Ó., & Villazón-Terrazas, J. (2017). A comparison of computer-based technologies suitable for cryptographic attacks. In Advances in Intelligent Systems and Computing (Vol. 527, pp. 621–630). Springer Verlag. https://doi.org/10.1007/978-3-319-47364-2_60

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free