{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:14:42Z","timestamp":1725513282454},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/ccst.2015.7389659","type":"proceedings-article","created":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T16:35:32Z","timestamp":1453739732000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Information password recovery with GPU"],"prefix":"10.1109","author":[{"given":"Kun-Chi","family":"Lu","sequence":"first","affiliation":[]},{"given":"Angus F.M.","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Addison Y.S.","family":"Su","sequence":"additional","affiliation":[]},{"given":"Ting-Jou","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Chiu-Nan","family":"Su","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Khronos OpenCL Working Group OpenCL 1 1 Reference Pages","year":"2012","key":"ref10"},{"journal-title":"The OpenCL Specification Khronos OpenCL Working Group","year":"2011","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102168"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806606"},{"journal-title":"NVIDIA Corporation NVIDIA OpenCL Best Practices Guide","year":"2009","key":"ref14"},{"journal-title":"Nvidia","year":"1988","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"key":"ref4","article-title":"Cracking DES: Secrets of encryption research, wiretap politics and chip design","author":"foundation","year":"1998","journal-title":"O'Reilly & Associates Inc"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669121"},{"journal-title":"OMP2OCL Translator A Translator for Automatic Translation of OpenMP Programs into OpenCL Programs Master","year":"2010","author":"tsai","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9206-6"},{"journal-title":"197 Advanced encryption standard (aes)","year":"2001","key":"ref8"},{"journal-title":"PKWARE ZIP File Format Specification","year":"2007","key":"ref7"},{"key":"ref2","article-title":"Applying cuda computing technology in the problem of recovering zip file password. In FAIR09","author":"dung","year":"2009","journal-title":"Proceedings of the 4th National Symposium of Fundamental and Applied Information Technology Research"},{"key":"ref1","first-page":"910","article-title":"Cryptanalysis of MD5 on GPU cluster","author":"nguyen","year":"2010","journal-title":"2010 International Conference on Information Security and Artificial Intelligence"},{"journal-title":"Aes encrytion info","year":"2008","key":"ref9"}],"event":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2015,9,21]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2015,9,24]]}},"container-title":["2015 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7369421\/7389647\/07389659.pdf?arnumber=7389659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:42:23Z","timestamp":1490395343000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7389659\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ccst.2015.7389659","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}