Abstract
The report describes how a so-called Beowulf cluster was set up at the university with available computers in order to use it for computing tasks in cryptanalysis and IT security. The reports also includes some examples of such applications. These are to be seen as ‘benchmarks’ for the computing power available at the university.
Type