Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices

MSM Malik, MA Ali, MA Khan… - IEEE …, 2020 - ieeexplore.ieee.org
This work reports a novel chaos-based affine transformation generation method, which is
based on rotational matrices to design strong key-based S-boxes. Chaotic logistic map's …

An adaptive distributed simulator for cloud and mapreduce algorithms and architectures

P Kathiravelu, L Veiga - 2014 IEEE/ACM 7th International …, 2014 - ieeexplore.ieee.org
Scalability and performance are crucial for simulations as much as accuracy is. Due to the
limited availability and access to the variety of resources, cloud and MapReduce solutions …

Concurrent and distributed cloudsim simulations

P Kathiravelu, L Veiga - … on Modelling, Analysis & Simulation of …, 2014 - ieeexplore.ieee.org
Cloud Computing researches involve a tremendous amount of entities such as users,
applications, and virtual machines. Due to the limited access and often variable availability …

Implementation of random forest algorithm with parallel computing in R

N Azizah, LS Riza, Y Wihardi - Journal of Physics: Conference …, 2019 - iopscience.iop.org
Random forest is a method for building models by combining decision trees or decision
trees generated from bootstrap samples and random features. A common problem that often …

Enhancing the performance of the advanced encryption standard (AES) algorithm using multiple substitution boxes

FV Wenceslao Jr - International Journal of Communication …, 2018 - search.proquest.com
This paper proposes for a modified version of the AES algorithm using multiple substitution
boxes (S-Boxes). While many studies have been conducted specifically on modifying the S …

A Java task pool framework providing fault-tolerant global load balancing

J Posner, C Fohry - International Journal of Networking and …, 2018 - jstage.jst.go.jp
Fault tolerance is gaining importance in parallel computing, especially on large clusters.
Traditional approaches handle the issue on system-level. Application-level approaches are …

Preserving security using crisscross AES and FCFS scheduling in cloud computing

K Ramkumar, G Gunasekaran - International Journal of …, 2019 - inderscienceonline.com
Cloud computing is a developing technology in distributed computing which provides pay
service model as per user need and requirement. Cloud includes the collection of virtual …

The influence of data size on a high-performance computing memetic algorithm in fingerprint dataset

P Assiroj, HLHS Warnars, E Abdurachman… - Bulletin of Electrical …, 2021 - beei.org
The fingerprint is one kind of biometric. This biometric unique data have to be processed
well and secure. The problem gets more complicated as data grows. This work is conducted …

Parallelization of AES algorithm for disk encryption using CBC and ICBC modes

A Desai, K Ankalgi, H Yamanur… - 2013 Fourth …, 2013 - ieeexplore.ieee.org
Computers have become more prevalent and their interconnection via networks has
increased the dependence of both organizations and individuals on the information stored …

[PDF][PDF] Performance efficiency of modified AES algorithm using multiple S-boxes

FV Wenceslao Jr - … Journal of New Computer Architectures and …, 2015 - researchgate.net
In our previous paper, we modified the Advance Encryption System (AES) algorithm by
proposing to use multiple substitution boxes (S-Boxes). While many studies have been …