{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T06:57:57Z","timestamp":1761893877738,"version":"3.30.2"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ispass.2003.1190233","type":"proceedings-article","created":{"date-parts":[[2003,10,1]],"date-time":"2003-10-01T14:56:02Z","timestamp":1065020162000},"page":"58-69","source":"Crossref","is-referenced-by-count":13,"title":["Accelerating private-key cryptography via multithreading on symmetric multiprocessors"],"prefix":"10.1109","author":[{"given":"P.","family":"Dongara","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"T.N.","family":"Vijaykumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/379240.379256"},{"journal-title":"Security requirements for cryptographic modules","year":"2001","key":"ref31"},{"journal-title":"Data Encryption Standard (DES) Triple DES and Skipjack Algorithms","year":"0","key":"ref30"},{"journal-title":"What is a VPN","year":"1998","author":"ferguson","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/368434.368726"},{"journal-title":"S\/390 and 05\/390 Cryptography","year":"0","key":"ref12"},{"journal-title":"Cybernetica's 4-way IDEA","year":"1999","author":"kase","key":"ref13"},{"journal-title":"NIST Special Publication 800&#x2013;20","year":"0","author":"keller","key":"ref14"},{"journal-title":"On the Design and Security of Block Ciphers","year":"1992","author":"lai","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/106972.106999"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/4434.895100"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/237090.237140"},{"journal-title":"Advanced Encryption Standard (AES) Development Effort","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.1999.762831"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/ISCA.1995.524578","article-title":"Simultaneous multithreading: Maximizing on-chip parallelism","author":"tullsen","year":"1995","journal-title":"Proceedings 22nd Annual International Symposium on Computer Architecture ISCA"},{"journal-title":"Twofish A 128-bit block cipher","year":"1998","author":"schneier","key":"ref3"},{"journal-title":"The MARS Encryption Algorithm","year":"1999","author":"burnwick","key":"ref6"},{"journal-title":"Cryptographic Module Validation Program","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379238"},{"journal-title":"AES proposal Rijndael","year":"1999","author":"daemen","key":"ref8"},{"journal-title":"Counterpane Systems","year":"0","key":"ref7"},{"key":"ref2","first-page":"178","article-title":"Security architecture for the internet protocol","author":"atkinson","year":"1996","journal-title":"IETF Draft Architecture ipsec-arch-sec00"},{"journal-title":"Security for Computer Networks","year":"1989","author":"davies","key":"ref9"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1145\/233013.233034","article-title":"Web server workload characterization: The search for invariants","author":"arlitt","year":"1996","journal-title":"Proceedings of the ACM SIGMETRICS '96 Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.1997.569611"},{"journal-title":"RSA Security","year":"0","key":"ref22"},{"journal-title":"The rc6 block cipher","year":"0","author":"rivest","key":"ref21"},{"key":"ref24","first-page":"138","article-title":"Bit permutation instructions for accelerating software cryptography","author":"shi","year":"2000","journal-title":"Proceedings of the IEEE International Conference on Application-Specific Systems Architectures and Processors"},{"journal-title":"Applied Cryptography","year":"1996","author":"schneier","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/92.820767"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/92.766756","article-title":"An improved montgomery's algorithm for high-speed RSA public-key cryptosystem","volume":"7","author":"su","year":"1999","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"}],"event":{"name":"2003 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS","acronym":"ISPASS-03","location":"Austin, TX, USA"},"container-title":["2003 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8467\/26677\/01190233.pdf?arnumber=1190233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T22:47:07Z","timestamp":1734130027000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1190233\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/ispass.2003.1190233","relation":{},"subject":[]}}