Singularity: Scientific containers for mobility of compute

GM Kurtzer, V Sochat, MW Bauer - PloS one, 2017 - journals.plos.org
Here we present Singularity, software developed to bring containers and reproducibility to
scientific computing. Using Singularity containers, developers can work in reproducible …

SHA-2 acceleration meeting the needs of emerging applications: A comparative survey

R Martino, A Cilardo - IEEE Access, 2020 - ieeexplore.ieee.org
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …

[图书][B] Reconfigurable computing: Accelerating computation with field-programmable gate arrays

MB Gokhale, PS Graham - 2006 - books.google.com
A one-of-a-kind survey of the field of Reconfigurable Computing Gives a comprehensive
introduction to a discipline that offers a 10X-100X acceleration of algorithms over …

Optimizing sha256 in bitcoin mining

NT Courtois, M Grajek, R Naik - … , CSS 2014, Lublin, Poland, September 22 …, 2014 - Springer
Bitcoin is a “crypto currency”, a decentralized electronic payment scheme based on
cryptography. It implements a particular type of peer-to-peer payment system. Bitcoin …

Privacy-preserving IoT data aggregation based on blockchain and homomorphic encryption

F Loukil, C Ghedira-Guegan, K Boukadi, AN Benharkat - Sensors, 2021 - mdpi.com
Data analytics based on the produced data from the Internet of Things (IoT) devices is
expected to improve the individuals' quality of life. However, ensuring security and privacy in …

AnFRA: Anonymous and fast roaming authentication for space information network

Q Yang, K Xue, J Xu, J Wang, F Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Nowadays, the Space Information Network (SIN) has been widely used in real life because
of its advantages of communicating anywhere at any time. This feature is leading to a new …

Designing a SHA-256 processor for blockchain-based IoT applications

R Martino, A Cilardo - Internet of Things, 2020 - Elsevier
An increasing number of Internet of Things applications have been recently considering the
use of the blockchain technology, calling for dedicated computational capabilities of the …

Safe is the new smart: PUF-based authentication for load modification-resistant smart meters

B Harishma, P Mathew, S Patranabis… - … on Dependable and …, 2020 - ieeexplore.ieee.org
In the energy sector, IoT manifests in the form of next-generation power grids that provide
enhanced electrical stability, efficient power distribution, and utilization. The primary feature …

An efficient key distribution system for data fusion in V2X heterogeneous networks

QIU Han, QIU Meikang, LU Zhihui, G Memmi - Information Fusion, 2019 - Elsevier
Data fusion in Vehicle-to-Everything (V2X) networks for different data types coming from
different sources is the foundation for decision making in the smart vehicle driving systems …

Improving SHA-2 hardware implementations

R Chaves, G Kuzmanov, L Sousa… - … Hardware and Embedded …, 2006 - Springer
This paper proposes a set of new techniques to improve the implementation of the SHA-2
hashing algorithm. These techniques consist mostly in operation rescheduling and …