{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T05:12:13Z","timestamp":1751951533452},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642023835"},{"type":"electronic","value":"9783642023842"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02384-2_22","type":"book-chapter","created":{"date-parts":[[2009,6,18]],"date-time":"2009-06-18T00:37:08Z","timestamp":1245285428000},"page":"350-367","source":"Crossref","is-referenced-by-count":39,"title":["Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware"],"prefix":"10.1007","author":[{"given":"Owen","family":"Harrison","sequence":"first","affiliation":[]},{"given":"John","family":"Waldron","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Nvidia CUDA Programming Guide, Version 2.0 (2008)"},{"key":"22_CR2","unstructured":"Microsoft, Direct X Technology, \n                    \n                      http:\/\/msdn.microsoft.com\/directx\/"},{"key":"22_CR3","unstructured":"Nvidia Corporation, \u201cCUDA\u201d, \n                    \n                      http:\/\/developer.nvidia.com\/object\/cuda.html"},{"key":"22_CR4","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996) ISBN 0-8493-8523-7"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular Multiplication Without Trial Division. Mathematics of Computation\u00a044, 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-540-30574-3_23","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"D. Cook","year":"2005","unstructured":"Cook, D., Ioannidis, J., Keromytis, A., Luck, J.: CryptoGraphics: Secret Key Cryptography Using Graphics Cards. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 334\u2013350. Springer, Heidelberg (2005)"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-540-74735-2_15","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"O. Harrison","year":"2007","unstructured":"Harrison, O., Waldron, J.: AES encryption implementation and analysis on commodity graphics processing units. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 209\u2013226. Springer, Heidelberg (2007)"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-76900-2_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"J. Yang","year":"2007","unstructured":"Yang, J., Goodman, J.: Symmetric Key Cryptography on Modern Graphics Hardware. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 249\u2013264. Springer, Heidelberg (2007)"},{"key":"22_CR9","unstructured":"Harrison, O., Waldron, J.: Practical Symmetric Key Cryptography on Modern Graphics Hardware. In: 17th USENIX Security Symposium, San Jose, CA, July 28 - August 1 (2008)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Moss, A., Page, D., Smart, N.P.: Toward Acceleration of RSA Using 3D Graphics Hardware. In: 11th IMA International Conference on Cryptography and Coding, Cirencester, UK, December 18-20 (2007)","DOI":"10.1007\/978-3-540-77272-9_22"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-540-72584-8_28","volume-title":"Computational Science \u2013 ICCS 2007","author":"S. Fleissner","year":"2007","unstructured":"Fleissner, S.: GPU-Accelerated Montgomery Exponentiation. In: Shi, Y., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2007. LNCS, vol.\u00a04487, pp. 213\u2013220. Springer, Heidelberg (2007)"},{"key":"22_CR12","unstructured":"AMD 64 RSA Benchmarks, \n                    \n                      http:\/\/www.cryptopp.com\/benchmarks-amd64.html"},{"key":"22_CR13","volume-title":"The Art of Computer Programming","author":"D.E. Knuth","year":"1997","unstructured":"Knuth, D.E.: The Art of Computer Programming, 3rd edn., vol.\u00a02. Addison-Wesley, Reading (1997)","edition":"3"},{"key":"22_CR14","unstructured":"OpenSSL Open Source Project, \n                    \n                      http:\/\/www.openssl.org\/"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-85053-3_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"R. Szerwinski","year":"2008","unstructured":"Szerwinski, R., G\u00fcneysu, T.: Exploiting the Power of GPUs for Asymmetric Cryptography. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 79\u201399. Springer, Heidelberg (2008)"},{"issue":"5","key":"22_CR16","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/71.382314","volume":"6","author":"K.C. Posch","year":"1995","unstructured":"Posch, K.C., Posch, R.: Modulo Reduction in Residues Numbers Systems. IEEE Trans. on Parallel and Distributed Systems\u00a06(5), 449\u2013454 (1995)","journal-title":"IEEE Trans. on Parallel and Distributed Systems"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/3-540-45539-6_37","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"S. Kawamura","year":"2000","unstructured":"Kawamura, S., Koike, M., Sano, F., Shimbo, A.: Cox-Rower Architecture for Fast Parallel Montgomery Multiplication. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 523\u2013538. Springer, Heidelberg (2000)"},{"key":"22_CR18","volume-title":"Residue Arithmetic and its Applications to Computer Technology","author":"N.S. Szabo","year":"1967","unstructured":"Szabo, N.S., Tanaka, R.I.: Residue Arithmetic and its Applications to Computer Technology. McGraw-Hill, New York (1967)"},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/BF02238608","volume":"50","author":"K.C. Posch","year":"1993","unstructured":"Posch, K.C., Posch, R.: Base Extension Using a Convolution Sum in Residue Number Systems. Computing\u00a050, 93\u2013104 (1993)","journal-title":"Computing"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Granlund, T., Montgomery, P.: Division by Invariant Integers using Multiplication. In: SIGPLAN 1994 Conference on Programming Language Design and Implementation, Orlando, Florida (June 1994)","DOI":"10.1145\/178243.178249"},{"issue":"21","key":"22_CR21","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18","author":"J.-J. Quisquater","year":"1982","unstructured":"Quisquater, J.-J., Couvreur, C.: Fast Decipherment Algorithm for RSA Public-Key Cryptosystem. Electronics Letters\u00a018(21), 905\u2013907 (1982)","journal-title":"Electronics Letters"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02384-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T17:07:51Z","timestamp":1547744871000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02384-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642023835","9783642023842"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02384-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}