{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:40:07Z","timestamp":1744069207274,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333828"},{"type":"electronic","value":"9783642333835"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33383-5_21","type":"book-chapter","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T02:51:51Z","timestamp":1346899911000},"page":"338-353","source":"Crossref","is-referenced-by-count":23,"title":["GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Gilger","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Barnickel","sequence":"additional","affiliation":[]},{"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Adams, C.: The CAST-128 Encryption Algorithm. RFC 2144 (Informational) (May 1997)","DOI":"10.17487\/rfc2144"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Agosta, G., Barenghi, A., Santis, F.D., Biagio, A.D., Pelosi, G.: Fast Disk Encryption through GPGPU Acceleration. In: PDCAT, pp. 102\u2013109. IEEE Computer Society (2009)","DOI":"10.1109\/PDCAT.2009.72"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Agosta, G., Barenghi, A., Santis, F.D., Pelosi, G.: Record Setting Software Implementation of DES Using CUDA. In: ITNG, pp. 748\u2013755. IEEE Computer Society (2010)","DOI":"10.1109\/ITNG.2010.43"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Biagio, A.D., Barenghi, A., Agosta, G., Pelosi, G.: Design of a parallel AES for graphics hardware using the CUDA framework. In: IPDPS, pp. 1\u20138. IEEE (2009)","DOI":"10.1109\/IPDPS.2009.5161242"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-642-15031-9_19","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"J.W. Bos","year":"2010","unstructured":"Bos, J.W., Stefan, D.: Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 279\u2013293. Springer, Heidelberg (2010)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-540-30574-3_23","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"D.L. Cook","year":"2005","unstructured":"Cook, D.L., Ioannidis, J., Keromytis, A.D., Luck, J.: CryptoGraphics: Secret Key Cryptography Using Graphics Cards. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 334\u2013350. Springer, Heidelberg (2005)"},{"key":"21_CR7","unstructured":"Daniel, T.R., Mircea, S.: AES on GPU using CUDA. In: 2010 European Conference for the Applied Mathematics & Informatics. World Scientific and Engineering Academy and Society Press (2010)"},{"key":"21_CR8","unstructured":"N. I. for Standards and Technology. Data Encryption Standard (DES). NIST FIPS PUB 46-3 (1999)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Gervasi, O., Russo, D., Vella, F.: The AES Implantation Based on OpenCL for Multi\/many Core Architecture. In: International Conference on Computational Science and its Applications, pp. 129\u2013134 (2010)","DOI":"10.1109\/ICCSA.2010.44"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-540-74735-2_15","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"O. Harrison","year":"2007","unstructured":"Harrison, O., Waldron, J.: AES Encryption Implementation and Analysis on Commodity Graphics Processing Units. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 209\u2013226. Springer, Heidelberg (2007)"},{"key":"21_CR11","unstructured":"Harrison, O., Waldron, J.: Practical Symmetric Key Cryptography on Modern Graphics Hardware. In: USENIX Security Symposium, pp. 195\u2013210. USENIX Association (2008)"},{"key":"21_CR12","first-page":"104","volume":"11","author":"O. Harrison","year":"2010","unstructured":"Harrison, O., Waldron, J.: GPU accelerated cryptography as an OS service. Transactions on Computational Science\u00a011, 104\u2013130 (2010)","journal-title":"Transactions on Computational Science"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Jang, K., Han, S., Han, S., Moon, S., Park, K.: Accelerating SSL with GPUs. In: SIGCOMM, pp. 437\u2013438. ACM (2010)","DOI":"10.1145\/1851275.1851250"},{"key":"21_CR14","unstructured":"Jang, K., Han, S., Han, S., Moon, S., Park, K.: SSLShader: Cheap SSL acceleration with commodity processors. In: Proceedings of NSDI 2011 (2011)"},{"key":"21_CR15","unstructured":"Khronos OpenCL Working Group. The OpenCL Specification, version 1.1 (September 30, 2010)"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11894063_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"S. Kumar","year":"2006","unstructured":"Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Schimmler, M.: Breaking Ciphers with COPACOBANA \u2013A Cost-Optimized Parallel Code Breaker. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 101\u2013118. Springer, Heidelberg (2006)"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/3-540-46877-3_35","volume-title":"Advances in Cryptology - EUROCRYPT \u201990","author":"X. Lai","year":"1991","unstructured":"Lai, X., Massey, J.L.: A Proposal for a New Block Encryption Standard. In: Damg\u00e5rd, I.B. (ed.) EUROCRYPT 1990. LNCS, vol.\u00a0473, pp. 389\u2013404. Springer, Heidelberg (1991)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Li, C., Wu, H., Chen, S., Li, X., Guo, D.: Efficient implementation for MD5-RC4 encryption using GPU with CUDA. In: Proceedings of the 3rd International Conference on Anti-Counterfeiting, Security, and Identification in Communication, pp. 167\u2013170. IEEE Press (2009)","DOI":"10.1109\/ICASID.2009.5276924"},{"key":"21_CR19","unstructured":"Luken, B.P., Ouyang, M., Desoky, A.H.: AES and DES encryption with GPU. In: ISCA PDCCS, pp. 67\u201370. ISCA (2009)"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Manavski, S.A.: CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: International Conference on Signal Processing and Communications, ICSPC 2007, pp. 65\u201368. IEEE (2008)","DOI":"10.1109\/ICSPC.2007.4728256"},{"key":"21_CR21","unstructured":"Margara, P.: engine-cuda (2011), http:\/\/code.google.com\/p\/engine-cuda\/ (accessed April 25, 2012)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Matsui, M., Nakajima, J., Moriai, S.: A Description of the Camellia Encryption Algorithm. RFC 3713 (Informational) (April 2004)","DOI":"10.17487\/rfc3713"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Mei, C., Jiang, H., Jenness, J.: CUDA-based AES parallelization with fine-tuned GPU memory utilization. In: IPDPS Workshops 2010, pp. 1\u20137 (2010)","DOI":"10.1109\/IPDPSW.2010.5470766"},{"issue":"12","key":"21_CR24","doi-asserted-by":"publisher","first-page":"2088","DOI":"10.1016\/j.jss.2011.05.027","volume":"84","author":"F. Milo","year":"2011","unstructured":"Milo, F., Bernaschi, M., Bisson, M.: A fast, GPU based, dictionary attack to OpenPGP secret keyrings. Journal of Systems and Software\u00a084(12), 2088\u20132096 (2011)","journal-title":"Journal of Systems and Software"},{"key":"21_CR25","unstructured":"Nazlee, A.M., Hussin, F.A., Ali, N.B.Z.: Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA). In: IEEE Student Conference on Research and Development (SCOReD), 2009, pp. 164\u2013167. IEEE (2010)"},{"key":"21_CR26","unstructured":"NIST. Advanced Encryption Standard (AES). National Institute of Standards and Technology (2001)"},{"key":"21_CR27","unstructured":"Noer, D., Engsig-Karup, A., Zenner, E.: Improved Software Implementation of DES Using CUDA and OpenCL"},{"key":"21_CR28","unstructured":"OpenSSL. OpenSSL: The Open Source toolkit for SSL\/TLS (2011), http:\/\/www.openssl.org\/ (accessed April 25, 2012)"},{"key":"21_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-58108-1_24","volume-title":"Fast Software Encryption","author":"B. Schneier","year":"1994","unstructured":"Schneier, B.: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 191\u2013204. Springer, Heidelberg (1994)"},{"key":"21_CR30","unstructured":"Sun, W.: kgpu: Augmenting Linux with the GPU (2011), http:\/\/code.google.com\/p\/kgpu\/ (accessed April 25, 2012)"},{"key":"21_CR31","unstructured":"Yamanouchi, T.: AES encryption and decryption on the GPU. In: Nguyen, H. (ed.) GPU Gems 3, ch. 36. Addison Wesley Professional (August 2007)"},{"key":"21_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-76900-2_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"J. Yang","year":"2007","unstructured":"Yang, J., Goodman, J.: Symmetric Key Cryptography on Modern Graphics Hardware. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 249\u2013264. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33383-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:02:16Z","timestamp":1744066936000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33383-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333828","9783642333835"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33383-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}