Hash-based authentication is an effective way of protecting passwords in software systems. Hashing obscures the original passwords, such that it cannot be recovered in case of a database breach. However, as demonstrated by our paper titled Hash-Based Authentication Revisited in the Age of High-Performance Computers, the practical security depends on which hashing algorithm is used as well as the …
Supervisors:
Pınar Tözün, Niclas Hedam
Tags: benchmarking, hashing, security, GPU, hacking, HPC
Reproducibility is a cornerstone of the scientific method. There are systems available today to build reproducible and sharable data and analysis pipelines including workflow engines (e.g., GWL, Nextflow), package managers (e.g., bioconda), and container systems (e.g., Singularity). However, validating their executions on high-performance computers remains an open issue. Indeed, there are many …
Supervisors:
Philippe Bonnet
Semester: Fall 2020
Tags: ML, reproducibility, workflow, HPC