{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:47:44Z","timestamp":1773773264009,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642385520","type":"print"},{"value":"9783642385537","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38553-7_11","type":"book-chapter","created":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T20:47:12Z","timestamp":1368046032000},"page":"189-207","source":"Crossref","is-referenced-by-count":6,"title":["New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs"],"prefix":"10.1007","author":[{"given":"Ayesha","family":"Khalid","sequence":"first","affiliation":[]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"eSTREAM: the ECRYPT Stream Cipher Project, \n                  \n                    http:\/\/www.ecrypt.eu.org\/stream"},{"key":"11_CR2","unstructured":"Bernstein, D.J.: Hash functions and ciphers. In Notes on the ECRYPT Stream Cipher Project (eSTREAM), \n                  \n                    http:\/\/cr.yp.to\/streamciphers\/why.html"},{"key":"11_CR3","unstructured":"Bernstein, D.J.: eBACS: ECRYPT Benchmarking of Cryptographic Systems, \n                  \n                    http:\/\/bench.cr.yp.to\/results-stream.html"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J.: The salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol.\u00a04986, pp. 84\u201397. Springer, Heidelberg (2008)"},{"key":"11_CR5","unstructured":"Bernstein, D.J.: ChaCha, a variant of Salsa20. Workshop Record of SASC 2008: The State of the Art of Stream Ciphers, \n                  \n                    http:\/\/cr.yp.to\/papers.html#chacha"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Biagio, A., Barenghi, A., Agosta, G., Pelosi, G.: Design of a parallel AES for graphics hardware using the CUDA framework. In: International Symposium on Parallel & Distributed Processing (IPDPS), pp. 1\u20138. IEEE (2009)","DOI":"10.1109\/IPDPS.2009.5161242"},{"issue":"1","key":"11_CR7","doi-asserted-by":"crossref","first-page":"131","DOI":"10.15803\/ijnc.2.1_131","volume":"2","author":"K. Iwai","year":"2012","unstructured":"Iwai, K., Nishikawa, N., Kurokawa, T.: Acceleration of AES encryption on CUDA GPU. International Journal of Networking and Computing\u00a02(1), 131\u2013145 (2012)","journal-title":"International Journal of Networking and Computing"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-37682-5_21","volume-title":"Information Security and Cryptology \u2013 ICISC 2012","author":"A. Khalid","year":"2013","unstructured":"Khalid, A., Bagchi, D., Paul, G., Chattopadhyay, A.: Optimized GPU implementation and performance analysis of HC series of stream ciphers. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol.\u00a07839, pp. 293\u2013308. Springer, Heidelberg (2013), \n                  \n                    http:\/\/eprint.iacr.org\/2013\/059"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Kurzak, J., Tomov, S., Dongarra, J.: Autotuning GEMM kernels for the Fermi GPU. In: Transactions on Parallel and Distributed Systems, pp. 2045\u20132057. IEEE (2012)","DOI":"10.1109\/TPDS.2011.311"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Manavski, S.A.: CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: International Signal Processing and Communications (ICSPC), pp. 65\u201368. IEEE (2007)","DOI":"10.1109\/ICSPC.2007.4728256"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Murthy, G.S., Ravishankar, M., Baskaran, M.M., Sadayappan, P.: Optimal loop unrolling for GPGPU programs. In: International Symposium on Parallel & Distributed Processing (IPDPS), pp. 1\u201311. IEEE (2010)","DOI":"10.1109\/IPDPS.2010.5470423"},{"key":"11_CR12","unstructured":"Neves, S.: Cryptography in GPUs. Master\u2019s thesis (2009), \n                  \n                    http:\/\/eden.dei.uc.pt\/~sneves\/pubs"},{"key":"11_CR13","unstructured":"Stefan, D.: Analysis and Implementation of eSTREAM and SHA-3 Cryptographic Algorithms. Master\u2019s thesis (2011), \n                  \n                    https:\/\/github.com\/deian\/gSTREAM\n                  \n                  \n                ."},{"key":"11_CR14","unstructured":"Wu, H.: The Stream Cipher HC-128, \n                  \n                    http:\/\/www.ecrypt.eu.org\/stream\/hcp3.html"},{"key":"11_CR15","unstructured":"NVIDIA\u2019s Next Generation CUDA Compute Architecture: Fermi, \n                  \n                    http:\/\/stanford-cs193g-sp2010.googlecode.com\/svn\/trunk\/lectures\/lecture_4\/cuda_memories.pdf"},{"key":"11_CR16","unstructured":"CUDA C Programming Guide, \n                  \n                    http:\/\/docs.nvidia.com\/cuda\/cuda-c-programming-guide\/index.html#ptx-compatibility"},{"key":"11_CR17","unstructured":"CUDA C Best Practices Guide, \n                  \n                    http:\/\/docs.nvidia.com\/cuda\/cuda-c-best-practices-guide\/index.html"},{"key":"11_CR18","unstructured":"Basic Linear Algebra Subprograms Technical Forum Standard (August 2001), \n                  \n                    http:\/\/www.netlib.org\/blas\/blast-forum\/blas-report.ps"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38553-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T19:48:45Z","timestamp":1557690525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38553-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385520","9783642385537"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38553-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}