{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T08:03:50Z","timestamp":1764403430059,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB0300101"],"award-info":[{"award-number":["2021YFB0300101"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032023, 42104078, 6190241"],"award-info":[{"award-number":["62032023, 42104078, 6190241"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s11227-024-06532-9","type":"journal-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T17:01:39Z","timestamp":1729443699000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An efficient heterogeneous parallel password recovery system on MT-3000"],"prefix":"10.1007","volume":"81","author":[{"given":"Yongtao","family":"Luo","sequence":"first","affiliation":[]},{"given":"Jie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chunye","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Tun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,20]]},"reference":[{"key":"6532_CR1","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.infsof.2017.09.012","volume":"94","author":"V Ignacio","year":"2018","unstructured":"Ignacio V, Ang\u00e9lica C, Alfonso R (2018) Authentication schemes and methods: a systematic literature review. Inf Softw Technol 94:30\u201337","journal-title":"Inf Softw Technol"},{"issue":"12","key":"6532_CR2","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1109\/JPROC.2003.819611","volume":"91","author":"L O'Gorman","year":"2003","unstructured":"O\u2019Gorman L (2003) Comparing passwords, tokens, and biometrics for user authentication. In proceedings of the IEEE 91(12):2021\u20132040","journal-title":"In proceedings of the IEEE"},{"key":"6532_CR3","doi-asserted-by":"publisher","unstructured":"Bo\u0161njak L, Sre\u0161 J, Brumen B (2018) Brute-force and dictionary attack on hashed real-world passwords. In\nproceedings of 41st International Convention on Information and Communication Technology, Electronics and\nMicroelectronics (MIPRO '18), Opatija, Croatia, 2018, 1161\u20131166. https:\/\/doi.org\/10.23919\/MIPRO.2018.8400211","DOI":"10.23919\/MIPRO.2018.8400211"},{"key":"6532_CR4","doi-asserted-by":"publisher","unstructured":"Narayanan A, Shmatikov V (2005) Fast dictionary attacks on passwords using time-space tradeoff. In proceedings of the 12th ACM conference on Computer and communications security. pp. 364\u2013372. https:\/\/doi.org\/10.1145\/1102120.1102168","DOI":"10.1145\/1102120.1102168"},{"key":"6532_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3376246","author":"Z Xie","year":"2024","unstructured":"Xie Z, Shi F, Zhang M, Ma H, Wang H, Li Z, Zhang Y (2024) GuessFuse: hybrid password guessing with multi-view. IEEE Trans Inf Forens Security. https:\/\/doi.org\/10.1109\/TIFS.2024.3376246","journal-title":"IEEE Trans Inf Forens Security"},{"key":"6532_CR6","unstructured":"Melicher W, Ur B, Segreti SM, Komanduri S, Bauer L, Christin N, Cranor LF (2016) Fast, lean, and accurate: modeling password guessability using neural networks. In proceedings of the 25th USENIX Security Symposium (USENIX Security 16). pp. 175\u2013191"},{"issue":"4","key":"6532_CR7","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/TC.2022.3197077","volume":"72","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Liu P, Wang W, Jiang Y (2022) RUPA: a high performance, energy efficient accelerator for rule-based password generation in heterogenous password recovery system. IEEE Trans Comput 72(4):900\u2013913","journal-title":"IEEE Trans Comput"},{"key":"6532_CR8","doi-asserted-by":"crossref","unstructured":"Zeng H, Prasanna V (2020) GraphACT: Accelerating GCN training on CPU-FPGA heterogeneous platforms. In proceedings of the 2020 ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays. pp. 255\u2013265","DOI":"10.1145\/3373087.3375312"},{"key":"6532_CR9","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1016\/j.enconman.2018.08.099","volume":"174","author":"R Ma","year":"2018","unstructured":"Ma R, Liu C, Zheng Z, Gechter F, Briois P, Gao F (2018) CPU-FPGA based real-time simulation of fuel cell electric vehicle. Energy Convers Manage 174:983\u2013997","journal-title":"Energy Convers Manage"},{"issue":"2","key":"6532_CR10","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TC.2018.2868191","volume":"68","author":"P Liu","year":"2018","unstructured":"Liu P, Li S, Ding Q (2018) An energy-efficient accelerator based on hybrid CPU-FPGA devices for password recovery. IEEE Trans Comput 68(2):170\u2013181","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"6532_CR11","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/s42514-022-00095-y","volume":"4","author":"K Lu","year":"2022","unstructured":"Lu K, Wang Y, Guo Y, Huang C, Liu S, Wang R, Fang J, Tang T, Chen Z, Liu B (2022) MT-3000: a heterogeneous multi-zone processor for HPC. CCF Trans High Perform Comput 4(2):150\u2013164","journal-title":"CCF Trans High Perform Comput"},{"key":"6532_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cpc.2023.108806","volume":"292","author":"R Li","year":"2023","unstructured":"Li R, Liu J, Zhang G, Gong C, Yang B, Liang Y (2023) An efficient heterogeneous parallel algorithm of the 3D MOC for multizone heterogeneous systems. Comput Phys Commun 292:108806","journal-title":"Comput Phys Commun"},{"key":"6532_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.future.2023.11.035","volume":"153","author":"J Li","year":"2024","unstructured":"Li J, Gu H, Zhao J, Qiao L, Gong C, Zheng G (2024) Transplantation and optimization of molecular dynamics simulation on MT-3000. Futur Gener Comput Syst 153:262\u2013275","journal-title":"Futur Gener Comput Syst"},{"key":"6532_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-016-5588-7","volume":"59","author":"H Fu","year":"2016","unstructured":"Fu H, Liao J, Yang J, Wang L, Song Z, Huang X, Yang C, Xue W, Liu F, Qiao F (2016) The Sunway TaihuLight supercomputer: system and applications. SCIENCE CHINA Inf Sci 59:1\u201316","journal-title":"SCIENCE CHINA Inf Sci"},{"issue":"4","key":"6532_CR15","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1631\/FITEE.2200359","volume":"24","author":"J Fang","year":"2023","unstructured":"Fang J, Zhang P, Huang C, Tang T, Lu K, Wang R, Wang Z (2023) Programming bare-metal accelerators with heterogeneous threading models: a case study of matrix-3000. Frontiers Inf Technol Electron Eng 24(4):509\u2013520","journal-title":"Frontiers Inf Technol Electron Eng"},{"key":"6532_CR16","first-page":"1","volume":"4","author":"Z Zhang","year":"2020","unstructured":"Zhang Z (2020) Liu P (2020) A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords. IACR Trans Cryptograph Hardw Embed Syst 4:1\u201323","journal-title":"IACR Trans Cryptograph Hardw Embed Syst"},{"key":"6532_CR17","doi-asserted-by":"publisher","first-page":"11830","DOI":"10.1109\/ACCESS.2022.3146148","volume":"10","author":"HL Pham","year":"2022","unstructured":"Pham HL, Tran TH, Le Duong VT, Nakashima Y (2022) A high-efficiency FPGA-based multimode SHA-2 accelerator. IEEE Access 10:11830\u201311845","journal-title":"IEEE Access"},{"issue":"2","key":"6532_CR18","first-page":"115","volume":"32","author":"H Zodpe","year":"2020","unstructured":"Zodpe H, Sapkal A (2020) An efficient AES implementation using FPGA with enhanced security features. J King Saud Univ-Eng Sci 32(2):115\u2013122","journal-title":"J King Saud Univ-Eng Sci"},{"key":"6532_CR19","doi-asserted-by":"publisher","first-page":"144574","DOI":"10.1109\/ACCESS.2021.3122466","volume":"9","author":"H Choi","year":"2021","unstructured":"Choi H, Seo SC (2021) Fast implementation of SHA-3 in GPU environment. IEEE Access 9:144574\u2013144586","journal-title":"IEEE Access"},{"issue":"10","key":"6532_CR20","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1109\/TPDS.2019.2911278","volume":"30","author":"O Hajihassani","year":"2019","unstructured":"Hajihassani O, Monfared SK, Khasteh SH, Gorgin S (2019) Fast AES implementation: a high-throughput bitsliced approach. IEEE Trans Parallel Distrib Syst 30(10):2211\u20132222","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"6532_CR21","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.jpdc.2019.12.013","volume":"138","author":"L Li","year":"2020","unstructured":"Li L, Fang J, Jiang J, Gan L, Zheng W, Fu H, Yang G (2020) Efficient AES implementation on Sunway TaihuLight supercomputer: a systematic approach. J Parallel and Distrib Comput 138:178\u2013189","journal-title":"J Parallel and Distrib Comput"},{"issue":"2","key":"6532_CR22","doi-asserted-by":"publisher","first-page":"2332","DOI":"10.1007\/s11227-022-04750-7","volume":"79","author":"Z Wang","year":"2023","unstructured":"Wang Z, Dong X, Kang Y, Chen H (2023) Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages. J Supercomput 79(2):2332\u20132355","journal-title":"J Supercomput"},{"issue":"S2","key":"6532_CR23","first-page":"745","volume":"49","author":"H Li","year":"2022","unstructured":"Li H, Han L, Tao H, Dong B (2022) Study on office password recovery vectorization technology based on Sunway many-core processor. Computer Science 49(S2):745\u2013749","journal-title":"Computer Science"},{"key":"6532_CR24","unstructured":"Hashcat-advanced password recovery. https:\/\/hashcat.net\/hashcat. Accessed 14 Sep 2024"},{"issue":"12","key":"6532_CR25","first-page":"2804","volume":"41","author":"B Li","year":"2018","unstructured":"Li B, Zhou Q, Si X (2018) A hybrid heterogeneous password recovery system. Chinese J Comput 41(12):2804\u20132822","journal-title":"Chinese J Comput"},{"key":"6532_CR26","doi-asserted-by":"publisher","first-page":"18085","DOI":"10.1109\/ACCESS.2021.3053068","volume":"9","author":"B Li","year":"2021","unstructured":"Li B, Feng F, Chen X, Cao Y (2021) Reconfigurable and high-efficiency password recovery algorithms based on HRCA. IEEE Access 9:18085\u201318111","journal-title":"IEEE Access"},{"key":"6532_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102667","volume":"16","author":"B Li","year":"2022","unstructured":"Li B, Zhou Q, Cao Y, Si X (2022) Cognitively reconfigurable mimic-based heterogeneous password recovery system. Comput Secur 16:102667","journal-title":"Comput Secur"},{"key":"6532_CR28","doi-asserted-by":"crossref","unstructured":"Weir M, Aggarwal S, De Medeiros B, B Glodek B (2009) Password cracking using probabilistic context-free grammars. In proceedings of 30th IEEE symposium on security and privacy. pp: 391\u2013405","DOI":"10.1109\/SP.2009.8"},{"key":"6532_CR29","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-3-319-24177-7_23","volume-title":"Computer security -- ESORICS 2015: 20th European symposium on research in computer security, Vienna, Austria, Proceedings, Part II","author":"D Wang","year":"2015","unstructured":"Wang D, Wang P (2015) The emperor\u2019s new password creation policies: an evaluation of leading web services and the effect of role in resisting against online guessing. In: Pernul G, Ryan PYA, Weippl E (eds) Computer security -- ESORICS 2015: 20th European symposium on research in computer security, Vienna, Austria, Proceedings, Part II. Springer International Publishing, Cham, pp 456\u2013477. https:\/\/doi.org\/10.1007\/978-3-319-24177-7_23"},{"key":"6532_CR30","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIFS.2020.3003696","volume":"16","author":"W Han","year":"2020","unstructured":"Han W, Xu M, Zhang J, Wang C, Zhang K, Wang X (2020) TransPCFG: transferring the grammars from short passwords to guess long passwords effectively. IEEE Trans Inf Forensics Secur 16:451\u2013465","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6532_CR31","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-030-21568-2_11","volume-title":"Applied cryptography and network security: 17th International Conference, ACNS 2019, Bogota, Colombia, Proceedings","author":"B Hitaj","year":"2019","unstructured":"Hitaj B, Gasti P, Ateniese G, Perez-Cruz F (2019) PassGAN: a deep learning approach for password guessing. In: Deng RH, Gauthier-Uma\u00f1a V, Ochoa M, Yung M (eds) Applied cryptography and network security: 17th International Conference, ACNS 2019, Bogota, Colombia, Proceedings. Springer International Publishing, Cham, pp 217\u2013237. https:\/\/doi.org\/10.1007\/978-3-030-21568-2_11"},{"key":"6532_CR32","unstructured":"Wang D, Zou Y, Zhang Z, Xiu K (2023) Password guessing using random forest. In proceedings of the 32nd USENIX Security Symposium (USENIX Security 23). pp: 965\u2013982"},{"key":"6532_CR33","unstructured":"Xu M, Yu J, Zhang X, Wang C, Zhang S, Wu H, Han W (2023) Improving real-world password guessing attacks via bi-directional transformers.In proceedings of the 32nd USENIX Security Symposium (USENIX Security 23). pp: 1001\u20131018"},{"issue":"11","key":"6532_CR34","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","volume":"12","author":"D Wang","year":"2017","unstructured":"Wang D, Cheng H, Wang P, Huang X, Jian G (2017) Zipf\u2019s law in passwords. IEEE Trans Inf Forensics Secur 12(11):2776\u20132791","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6532_CR35","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/TIFS.2022.3176185","volume":"18","author":"Z Hou","year":"2022","unstructured":"Hou Z, Wang D (2022) New Observations on Zipf\u2019s Law in passwords. IEEE Trans Inf Forensics Secur 18:517\u2013532","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6532_CR36","doi-asserted-by":"publisher","unstructured":"Luo Y, Liu J, Xiao T, Gong C (2023) Parallel Implementation of SHA256 on Multizone Heterogeneous Systems. IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom). pp. 416\u2013422. https:\/\/doi.org\/10.1109\/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00087","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00087"},{"key":"6532_CR37","doi-asserted-by":"crossref","unstructured":"Markus K, Markus M, Daniel B, Christian K, Wolfgang K (2016) Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering. In: international conference on cryptographic hardware and embedded systems -CHES 2016. Springer. pp. 559\u2013577","DOI":"10.1007\/978-3-662-53140-2_27"},{"issue":"7","key":"6532_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218126615501054","volume":"24","author":"T Johnson","year":"2015","unstructured":"Johnson T, Roggow D, Jones PH, Zambreno J (2015) An FPGA architecture for the recovery of WPA\/WPA2 keys. J Circuits Syst Comput 24(7):1\u201326","journal-title":"J Circuits Syst Comput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06532-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06532-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06532-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T17:02:04Z","timestamp":1729443724000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06532-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,20]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["6532"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06532-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2024,10,20]]},"assertion":[{"value":"17 September 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Confict of interest"}}],"article-number":"38"}}