{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T11:12:55Z","timestamp":1769339575661,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642176968","type":"print"},{"value":"9783642176975","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17697-5_6","type":"book-chapter","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T02:22:58Z","timestamp":1291688578000},"page":"104-130","source":"Crossref","is-referenced-by-count":2,"title":["GPU Accelerated Cryptography as an OS Service"],"prefix":"10.1007","author":[{"given":"Owen","family":"Harrison","sequence":"first","affiliation":[]},{"given":"John","family":"Waldron","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Bernstein, D., Chen, T.-R., Cheng, C.-M., Lange, T., Yang, B.-Y.: ECM on Graphics Cards. In: International Conference on Advances in Cryptology - Eurocrypt, pp. 483\u2013501 (April 2009)","DOI":"10.1007\/978-3-642-01001-9_28"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Fleissner, S.: GPU-Accelerated Montgomery Exponentiation. In: International Conference on Computational Science ICCS, pp. 213\u2013220 (May 2007)","DOI":"10.1007\/978-3-540-72584-8_28"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-540-74735-2_15","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"O. Harrison","year":"2007","unstructured":"Harrison, O., Waldron, J.: AES Encryption Implementation and Analysis on Commodity Graphics Processing Units. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 209\u2013226. Springer, Heidelberg (2007)"},{"key":"6_CR4","unstructured":"Harrison, O., Waldron, J.: Practical Symmetric Key Cryptography on Modern Graphics Hardware. In: USENIX Security Symposium, pp. 195\u2013209 (July 2008)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-642-02384-2_22","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"O. Harrison","year":"2009","unstructured":"Harrison, O., Waldron, J.: Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol.\u00a05580, pp. 350\u2013367. Springer, Heidelberg (2009)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Manavski, S.A.: CUDA Compatible GPU as an Efficient Hardware Accelerator for AES Cryptography. In: IEEE International Conference on Signal Processing and Communications, pp. 65\u201368 (November 2007)","DOI":"10.1109\/ICSPC.2007.4728256"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Moss, A., Page, D., Smart, N.P.: Toward Acceleration of RSA Using 3D Graphics Hardware. In: IMA International Conference on Cryptography and Coding, pp. 364\u2013383 (December 2007)","DOI":"10.1007\/978-3-540-77272-9_22"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-85053-3_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"R. Szerwinski","year":"2008","unstructured":"Szerwinski, R., G\u00fcneysu, T.: Exploiting the Power of GPUs for Asymmetric Cryptography. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 79\u201399. Springer, Heidelberg (2008)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-76900-2_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"J. Yang","year":"2007","unstructured":"Yang, J., Goodman, J.: Symmetric Key Cryptography on Modern Graphics Hardware. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 249\u2013264. Springer, Heidelberg (2007)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Yeom, Y., Cho, Y., Yung, M.: High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units. In: International Conference on Multimedia and Ubiquitous Engineering, pp. 271\u2013275 (April 2008)","DOI":"10.1109\/MUE.2008.94"},{"key":"6_CR11","unstructured":"Leffler, S.J.: Cryptographic device support for FreeBSD. In: Usenix, BSD Conference, pp. 69\u201378 (September 2003)"},{"key":"6_CR12","unstructured":"OCF-Linux Project, \n                  \n                    http:\/\/ocf-linux.sourceforge.net\/"},{"key":"6_CR13","unstructured":"linux-crypto (Crypto API), \n                  \n                    http:\/\/mail.nl.linux.org\/linux-crypto\/"},{"key":"6_CR14","unstructured":"Harrison, O.: Source code, \n                  \n                    http:\/\/www.scss.tcd.ie\/~harrisoo\/code.html"},{"issue":"3","key":"6_CR15","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1145\/1141911.1141947","volume":"25","author":"D. Blythe","year":"2006","unstructured":"Blythe, D.: The Direct 3D 10 System. ACM Transactions on Graphics\u00a025(3), 724\u2013734 (2006)","journal-title":"ACM Transactions on Graphics"},{"key":"6_CR16","unstructured":"Nvidia Corporation, CUDA, \n                  \n                    http:\/\/developer.nvidia.com\/object\/cuda.html"},{"key":"6_CR17","unstructured":"Rosenberg, U.: Using Graphic Processing Unit in Block Cipher Calculations. Master\u2019s Thesis, University of Tartu (2007)"},{"key":"6_CR18","unstructured":"Harrison, O.: Acceleration of Cryptographic Functions using Graphics Hardware (2010), \n                  \n                    https:\/\/www.scss.tcd.ie\/publications\/tech-reports\/tr-index.10.php"},{"issue":"21","key":"6_CR19","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18","author":"J.-J. Quisquater","year":"2008","unstructured":"Quisquater, J.-J., Couvreur, C.: Fast Decipherment Algorithm for RSA Public-Key Cryptosystem. Electronics Letters\u00a018(21), 905\u2013907 (2008)","journal-title":"Electronics Letters"},{"key":"6_CR20","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"issue":"4-5","key":"6_CR21","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1016\/j.engappai.2008.10.025","volume":"22","author":"M.C. Riffa","year":"2009","unstructured":"Riffa, M.C., Bonnairea, X., Neveub, B.: A revision of recent approaches for two-dimensional strip-packing problems. Engineering Applications of Artificial Intelligence\u00a022(4-5), 823\u2013827 (2009)","journal-title":"Engineering Applications of Artificial Intelligence"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science XI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17697-5_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:52:02Z","timestamp":1619772722000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17697-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176968","9783642176975"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17697-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}