{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T18:29:13Z","timestamp":1773858553553,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540747345","type":"print"},{"value":"9783540747352","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74735-2_15","type":"book-chapter","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T10:33:47Z","timestamp":1187778827000},"page":"209-226","source":"Crossref","is-referenced-by-count":43,"title":["AES Encryption Implementation and Analysis on Commodity Graphics Processing Units"],"prefix":"10.1007","author":[{"given":"Owen","family":"Harrison","sequence":"first","affiliation":[]},{"given":"John","family":"Waldron","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","first-page":"33","volume-title":"IEEE Visualization 2005","author":"I. Buck","year":"2005","unstructured":"Buck, I., Lefohn, A., McCormick, P., Owens, J., Purcell, T., Strzodka, R.: General Purpose Computation on Graphics Hardware. In: IEEE Visualization 2005, Minneapolis, USA, p. 33. IEEE Computer Society Press, Los Alamitos (2005)"},{"issue":"4\/5","key":"15_CR2","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1147\/rd.494.0589","volume":"49","author":"J. Kahle","year":"2005","unstructured":"Kahle, J., Day, M., Hofstee, H., Johns, C., Maeurer, T., Shippy, D.: Introduction to the Cell multiprocessor. IBM Journal of Research and Development\u00a049(4\/5), 589\u2013604 (2005)","journal-title":"IBM Journal of Research and Development"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_31","volume-title":"Information and Communications Security","author":"D. Cook","year":"2005","unstructured":"Cook, D., Baratto, R., Keromytis, A.: Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. In: Qing, S., Mao, W., Lopez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol.\u00a03783, Springer, Heidelberg (2005)"},{"key":"15_CR4","unstructured":"National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard (November 2001), http:\/\/www.itl.nist.gov\/fipspubs\/"},{"key":"15_CR5","unstructured":"Daemen, J., Rijmen, V.: The Rijndael Block Cipher (September 1999), http:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/rijndael\/"},{"key":"15_CR6","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1997)"},{"key":"15_CR7","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. In: 38th Annual Symposium on Foundations of Computer Science (FOCS 1997) (1997)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Kohno, T., Viega, J., Whiting, D.: CWC: A high-performance conventional authenticated encryption mode. In: The Fast Software Encryption Workshop, Delhi, India, pp. 408\u2013426 (February 2004)","DOI":"10.1007\/978-3-540-25937-4_26"},{"key":"15_CR9","unstructured":"ARB, O., Shreiner, D., Woo, M., Neider, J., Davis, T.: OpenGL Programming Guide: The Official Guide to Learning OpenGL. Version 2 (2005)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-45682-1_15","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A. Satoh","year":"2001","unstructured":"Satoh, A., et al.: A Compact Rijndael Hardware Architecture with S-Box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 239\u2013254. Springer, Heidelberg (2001)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Wolkerstorfer, J., Oswald, E., Lamberger, M.: An ASIC Implementation of the AES Sboxes. In: RSA Conference 02, San Jose, CA (February 2002)","DOI":"10.1007\/3-540-45760-7_6"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/1057661.1057677","volume-title":"Proceedings of the 15th ACM Great Lakes Symposium on VLSI 2005","author":"A. Hodjat","year":"2005","unstructured":"Hodjat, A., Hwang, D., Lai, B., Tiri, K., Verbauwhede, I.: A 3.84 Gbits\/s AES crypto coprocessor with modes of operation in a 0.18-um CMOS Technology. In: Proceedings of the 15th ACM Great Lakes Symposium on VLSI 2005, pp. 60\u201363. ACM Press, New York (2005)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"McLoone, M., McCanny, J.: High Performance Single Chip FPGA Rijndael Algorithm Implementations. In: Workshop on Cryptographic Hardware and Embedded Systems, Paris (2001)","DOI":"10.1007\/3-540-44709-1_7"},{"issue":"4","key":"15_CR14","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1109\/92.931230","volume":"9","author":"A. Elbirt","year":"2001","unstructured":"Elbirt, A., Yip, W., Chetwynd, B., Paar, C.: An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists. IEEE Trans. of VLSI Systems\u00a09(4), 545\u2013557 (2001)","journal-title":"IEEE Trans. of VLSI Systems"},{"key":"15_CR15","first-page":"83","volume-title":"2004 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2004), Emerging Trends in VLSI Systems Design","author":"A. Hodjat","year":"2004","unstructured":"Hodjat, A., Verbauwhede, I.: Minimum Area Cost for a 30 to 70 Gbits\/s AES Processor. In: 2004 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2004), Emerging Trends in VLSI Systems Design, pp. 83\u201388. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"D. Cook","year":"2005","unstructured":"Cook, D., Ioannidis, J., Keromytis, A., Luck, J.: CryptoGraphics: Secret Key Cryptography Using Graphics Cards. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, Springer, Heidelberg (2005)"},{"key":"15_CR17","unstructured":"Kedem, G., Ishihara, Y.: Brute Force Attack On Unix Passwords With SIMD Computer. In: Proceedings of the 8th USENIX Security Symposium, Washington, D.C., USA (August 23-26, 1999)"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Olano, M., Lastra, A.: A Shading Language on Graphics Hardware: The PixelFlow Shading System. Journal of Computer Graphics, 159\u2013168 (1998)","DOI":"10.1145\/280814.280857"},{"key":"15_CR19","unstructured":"Buck, I.: Data parallel computing on graphics hardware. In: Siggraph 03: Graphics Hardware Panel, San Diego, USA (2003)"},{"key":"15_CR20","unstructured":"Venkatasubramanian, S.: The graphics card as a stream computer. In: DIMACS Workshop on Management and Processing of Data Streams, San Diego, USA (2003)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Govindaraju, N., Gray, J., Kumar, R., Manocha, D.: Gputerasort: High performance graphics coprocessor sorting for large database management. ACM SIGMOD\/PODS, Chicago, USA (2006)","DOI":"10.1145\/1142473.1142511"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Fung, J., Mann, S., Aimone, C.: Openvidia: Parallel gpu computer vision. ACM Multimedia, Singapore (2005)","DOI":"10.1145\/1101149.1101334"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Govindaraju, N.K., Raghuvanshi, N., Manocha, D.: Fast and approximate stream mining of quantiles and frequencies using graphics processors. In: ACM SIGMOD\/PODS, Baltimore, Maryland, USA (2005)","DOI":"10.1145\/1066157.1066227"},{"key":"15_CR24","unstructured":"Owens, J.D.: A survey of general-purpose computation on graphics hardware. In: Eurographics, Dublin, Ireland (2005)"},{"key":"15_CR25","unstructured":"The GPGPU Resources and Forums, available online at http:\/\/www.gpgpu.org\/"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Buck, I., Foley, T., Horn, D., Sugerman, J., Fatahalian, K., Houston, M., Hanrahan, P.: Brook for GPUs: Stream Computing on Graphics Hardware. In: SIGGRAPH, Las Angeles, USA (2004)","DOI":"10.1145\/1186562.1015800"},{"key":"15_CR27","unstructured":"Buck, I., Fatahalian, K., Hanrahan, P.: Gpubench: Evaluating gpu performance for numerical and scientifc applications. In: ACM Workshop on General Purpose Computing on Graphics Processors, LA, USA (2004)"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Hill, M., Smith, A.: Evaluating associativity in cpu caches. IEEE Transactions on Computers\u00a038(12), 1612\u20131630","DOI":"10.1109\/12.40842"},{"key":"15_CR29","unstructured":"National Institute of Standards and Technology (NIST). FIPS-46-3: Data Encryption Standard (1976), http:\/\/www.itl.nist.gov\/fipspubs\/"},{"key":"15_CR30","unstructured":"Rijmen, V., Bosselaers, A., Barreto, P.: Optimised ANSI C code for the Rijndael cipher, Version 3.0 (December 2000), http:\/\/homes.esat.kuleuven.be\/~rijmen\/rijndael\/"},{"key":"15_CR31","unstructured":"OpenSSL: Open Source Project, can be accessed online at http:\/\/www.openssl.org\/"},{"key":"15_CR32","unstructured":"Harrison, O., Waldron, J.: Optimising Data Movement Rates for Parallel Processing Applications on Graphics Processors. In: 25th International Conference on Parallel and Distributed Computing and Networks, February 13-15, Innsbruck, Austria (2007)"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Govindaraju, N., Larsen, S., Gray, J., Manocha, D.: A Memory Model for Scientific Algorithms on Graphics Processors, SC06, Florida, USA (2006)","DOI":"10.1109\/SC.2006.2"},{"key":"15_CR34","unstructured":"Lipmaa, H.: AES\/Rijndael: speed, http:\/\/www.adastral.ucl.ac.uk\/~helger\/research\/aes\/rijndael.html"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74735-2_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:35:12Z","timestamp":1619519712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74735-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540747345","9783540747352"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74735-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}