Accelerating RSA with Fine-Grained Parallelism Using GPU
暂无分享,去创建一个
[1] Elaine B. Barker,et al. SP 800-131A. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .
[2] J. Quisquater,et al. Fast decipherment algorithm for RSA public-key cryptosystem , 1982 .
[3] Ç. Koç,et al. Incomplete reduction in modular arithmetic , 2002 .
[4] Jiawei Zhu,et al. Accelerating AES in JavaScript with WebGL , 2013, ICICS.
[5] Burton S. Kaliski,et al. A Cryptographic Library for the Motorola DSP56000 , 1991, EUROCRYPT.
[6] Laxmi N. Bhuyan,et al. Anatomy and Performance of SSL Processing , 2005, IEEE International Symposium on Performance Analysis of Systems and Software, 2005. ISPASS 2005..
[7] Samuel Neves,et al. On the performance of GPU public-key cryptography , 2011, ASAP 2011 - 22nd IEEE International Conference on Application-specific Systems, Architectures and Processors.
[8] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[9] Pradeep Dubey,et al. Debunking the 100X GPU vs. CPU myth: an evaluation of throughput computing on CPU and GPU , 2010, ISCA.
[10] Nigel P. Smart,et al. Toward Acceleration of RSA Using 3D Graphics Hardware , 2007, IMACC.
[11] Seungyeop Han,et al. SSLShader: Cheap SSL Acceleration with Commodity Processors , 2011, NSDI.
[12] Tim Güneysu,et al. Exploiting the Power of GPUs for Asymmetric Cryptography , 2008, CHES.
[13] Tolga Acar,et al. Analyzing and comparing Montgomery multiplication algorithms , 1996, IEEE Micro.
[14] John Waldron,et al. Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware , 2009, AFRICACRYPT.
[15] Zhe Liu,et al. High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit , 2014, ISPEC.
[16] Yuan Zhao,et al. Exploiting the Floating-Point Computing Power of GPUs for RSA , 2014, ISC.
[17] S.A. Manavski,et al. CUDA Compatible GPU as an Efficient Hardware Accelerator for AES Cryptography , 2007, 2007 IEEE International Conference on Signal Processing and Communications.
[18] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.