{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:24:44Z","timestamp":1743146684194,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030166595"},{"type":"electronic","value":"9783030166601"}],"license":[{"start":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T00:00:00Z","timestamp":1555200000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-16660-1_37","type":"book-chapter","created":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T16:06:56Z","timestamp":1555171616000},"page":"372-380","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Accelerating Image Encryption with AES Using GPU: A Quantitative Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0771-5933","authenticated-orcid":false,"given":"Aryan","family":"Saxena","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9049-9735","authenticated-orcid":false,"given":"Vatsal","family":"Agrawal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1518-7926","authenticated-orcid":false,"given":"Rajdeepa","family":"Chakrabarty","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8758-7355","authenticated-orcid":false,"given":"Shubhjeet","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6575-9830","authenticated-orcid":false,"given":"J. Saira","family":"Banu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,14]]},"reference":[{"issue":"2","key":"37_CR1","first-page":"287","volume":"8","author":"M Nagendra","year":"2014","unstructured":"Nagendra, M., Sekhar, M.C.: Performance improvement of advanced encryption algorithm using parallel computation. Int. J. Softw. Eng. Appl. 8(2), 287\u2013296 (2014)","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"37_CR2","unstructured":"Elkabbany, G.F., Aslan, H.K., Rasslan, M.N.: A design of a fast parallel- pipelined implementation of AES: advanced encryption standard. arXiv preprint \n                  arXiv:1501.01427\n                  \n                 (2015)"},{"key":"37_CR3","unstructured":"Daniel, T.R., Stratulat, M.: AES on GPU using CUDA. In: 2010 European Conference for the Applied Mathematics & Informatics. World Scientific and Engineering Academy and Society Press (2010)"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Sowmiya, S., Tresa, I.M., Chakkaravarthy, A.P.: Pixel based image encryption using magic square. In: 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), pp. 1\u20134. IEEE (2017)","DOI":"10.1109\/ICAMMAET.2017.8186634"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Feng, X., Tian, X., Xia, S.: A novel image encryption algorithm based on fractional fourier transform and magic cube rotation. In: 2012 4th International Congress on Image and Signal Processing (CISP), vol. 2, pp. 1008\u20131011. IEEE (2012)","DOI":"10.1109\/CISP.2011.6100319"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Ren, S., Gao, C., Dai, Q., Fei, X.: Attack to an image encryption algorithm based on improved chaotic cat maps. In: 2012 3rd International Congress on Image and Signal Processing (CISP), vol. 2, pp. 533\u2013536. IEEE (2010)","DOI":"10.1109\/CISP.2010.5647659"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Lei, Z., Li, L., Xianwei, G.: Design and realization of image encryption system based on SMS4 commercial cipher algorithm. In: 2012 4th International Congress on Image and Signal Processing (CISP), vol. 2, pp. 741\u2013744. IEEE (2012)","DOI":"10.1109\/CISP.2011.6100292"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Li, Q., Zhong, C., Zhao, K., Mei, X., Chu, X.: Implementation and analysis of AES encryption on GPU. In: 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), pp. 843\u2013848. IEEE (2012)","DOI":"10.1109\/HPCC.2012.119"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Abdelrahman, A.A., Fouad, M.M., Dahshan, H., Mousa, A.M.: High performance CUDA AES implementation: a quantitative performance analysis approach. In: Computing Conference 2017, pp. 1077\u20131085. IEEE (2017)","DOI":"10.1109\/SAI.2017.8252225"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Khan, A.H., Al-Mouhamed, M.A., Almousa, A., Fatayar, A., Ibrahim, A.R., Siddiqui, A.J.: Aes-128 ECB encryption on GPU and effects of input plaintext patterns on performance. In: 2014 15th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, SNPD, pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/SNPD.2014.6888707"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Patchappen, M., Yassin, Y.M., Karuppiah, E.K.: Batch processing of multi-variant AES cipher with GPU. In: 2015 Second International Conference on Computing Technology and Information Management (ICCTIM), pp. 32\u201336. IEEE (2015)","DOI":"10.1109\/ICCTIM.2015.7224589"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Ma, J., Chen, X., Xu, R., Shi, J.: Implementation and evaluation of different parallel designs of AES using CUDA. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 606\u2013614. IEEE (2017)","DOI":"10.1109\/DSC.2017.19"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Subramanyan, B., Chhabria, V.M., Sankar Babu, T.G.: Image encryption based on AES key expansion. In: 2011 Second International Conference on Emerging Applications of Information Technology (2011)","DOI":"10.1109\/EAIT.2011.60"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, Y.: Test and verification of AES used for image encryption. Published online: 12 January 2018. 3D Research Center, Kwangwoon University and Springer-Verlag GmbH Germany, part of Springer Nature (2018)","DOI":"10.1007\/s13319-017-0154-7"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16660-1_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T08:12:08Z","timestamp":1567843928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-16660-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,14]]},"ISBN":["9783030166595","9783030166601"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16660-1_37","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,14]]},"assertion":[{"value":"14 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA 2018","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vellore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}