Communications of the ACM
Information Processing Letters
Parallel processing in industrial real-time applications
Parallel processing in industrial real-time applications
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Approximation algorithms for NP-hard problems
Kasparov versus deep blue: computer chess comes of age
Kasparov versus deep blue: computer chess comes of age
Parallel computation: models and methods
Parallel computation: models and methods
A case study in real-time parallel computation: correcting algorithms
Journal of Parallel and Distributed Computing
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Contemporary Cryptology: The Science of Information Integrity
Contemporary Cryptology: The Science of Information Integrity
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Real-Time Database and Information
Real-Time Database and Information
Three non Conventional Paradigms of Parallel Computation
Proceedings of the First Heinz Nixdorf Symposium on Parallel Architectures and Their Efficient Use
On a Nearest-Neighbor Problem Under Minkowski and Power Metrics for Large Data Sets
The Journal of Supercomputing - Special issue on computational issues in fluid dynamics optimization and simulation
The Journal of Supercomputing
Real-time minimum vertex cover for two-terminal series-parallel graphs
International Journal of High Performance Computing and Networking
Parallelization of prime number generation using message passing interface
WSEAS Transactions on Computers
Solving traveling salesman problem on high performance computing using message passing interface
CIMMACS'08 Proceedings of the 7th WSEAS international conference on Computational intelligence, man-machine systems and cybernetics
Solving traveling salesman problem on cluster compute nodes
WSEAS Transactions on Computers
Evaluation of QoS-compliant overlays under denial of service attacks
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
Parallelization of prime number generation using message passing interface
CIMMACS'07 Proceedings of the 6th WSEAS international conference on Computational intelligence, man-machine systems and cybernetics
Journal of Parallel and Distributed Computing
Hi-index | 0.01 |
The primary purpose of parallel computation is the fast execution of computational tasks that are too slow to perform sequentially. However, it was shown recently that a second equally important motivation for using parallel computers exists: Within the paradigm of real-time computation, some classes of problems have the property that a solution to a problem in the class computed in parallel is better than the one obtained on a sequential computer. What represents a better solution depends on the problem under consideration. Thus, for optimization problems, ‘better’ means ‘closer to optimal’. Similarly, for numerical problems, a solution is ‘better’ than another one if it is ‘more accurate’. The present paper continues this line of inquiry by exploring another class enjoying the aforementioned property, namely, cryptographic problems in a real-time setting. In this class, ‘better’ means ‘more secure’. A real-time cryptographic problem is presented for which the parallel solution is provably, considerably, and consistently better than a sequential one.It is important to note that the purpose of this paper is not to demonstrate merely that a parallel computer can obtain a better solution to a computational problem than one derived sequentially. The latter is an interesting (and often surprising) observation in its own right, but we wish to go further. It is shown here that the improvement in quality can be arbitrarily high (and certainly superlinear in the number of processors used by the parallel computer). This result is akin to superlinear speedup—a phenomenon itself originally thought to be impossible.