{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:37Z","timestamp":1750306297133,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T00:00:00Z","timestamp":1462752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,9]]},"DOI":"10.1145\/2908446.2908491","type":"proceedings-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T12:49:08Z","timestamp":1478263748000},"page":"247-253","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Implementation of McEliece Cryptosystem on Graphic Processing Unit"],"prefix":"10.1145","author":[{"given":"Alaa Mahmoud","family":"Elsobky","sequence":"first","affiliation":[{"name":"Computer Science Dept., Faculty of Computers and Information, Menoufia University, Shebin El-Kom, Egypt"}]},{"given":"Abdelalim Kamal","family":"Farag","sequence":"additional","affiliation":[{"name":"Computer Science Dept., Faculty of Computers and Information, Menoufia University, Shebin El-Kom, Egypt"}]},{"given":"Arabi","family":"Keshk","sequence":"additional","affiliation":[{"name":"Computer Science Dept., Faculty of Computers and Information, Menoufia University, Shebin El-Kom, Egypt"}]}],"member":"320","published-online":{"date-parts":[[2016,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Introduction to OpenCL\u2122 Programming Training Guide. May 2010.  Introduction to OpenCL\u2122 Programming Training Guide. May 2010."},{"key":"e_1_3_2_1_2_1","volume-title":"Pearson Education","author":"Aaftab Munshi T. G. M. J. F. S. G.","year":"2011","unstructured":"T. G. M. J. F. S. G. Aaftab Munshi , Benedict R. Gaster . OpenCL programming guide . Pearson Education , 2011 . T. G. M. J. F. S. G. Aaftab Munshi, Benedict R. Gaster. OpenCL programming guide. Pearson Education, 2011."},{"key":"e_1_3_2_1_3_1","first-page":"174","volume-title":"Selected Areas in Cryptography","author":"Berbain C.","year":"2006","unstructured":"C. Berbain , O. Billet , and H. Gilbert . Efficient implementations of multivariate quadratic systems . In Selected Areas in Cryptography , pages 174 -- 187 . Springer , 2006 . C. Berbain, O. Billet, and H. Gilbert. Efficient implementations of multivariate quadratic systems. In Selected Areas in Cryptography, pages 174--187. Springer, 2006."},{"key":"e_1_3_2_1_4_1","first-page":"67","volume-title":"ISCA PDCCS","author":"Luken M. O.","year":"2009","unstructured":"M. O. Brandon P Luken and A. H. Desoky . Aes and des encryption with gpu . In ISCA PDCCS , pages 67 -- 70 , 2009 . M. O. Brandon P Luken and A. H. Desoky. Aes and des encryption with gpu. In ISCA PDCCS, pages 67--70, 2009."},{"key":"e_1_3_2_1_5_1","first-page":"167","volume-title":"ASID 2009. 3rd International Conference on","author":"Changxin Li S. C. X. L.","year":"2009","unstructured":"S. C. X. L. Changxin Li , Hongwei Wu and D. Guo . Efficient implementation for md5-rc4 encryption using gpu with cuda. In Anti-counterfeiting, Security, and Identification in Communication, 2009 . ASID 2009. 3rd International Conference on , pages 167 -- 170 . IEEE, 2009 . S. C. X. L. Changxin Li, Hongwei Wu and D. Guo. Efficient implementation for md5-rc4 encryption using gpu with cuda. In Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference on, pages 167--170. IEEE, 2009."},{"key":"e_1_3_2_1_6_1","volume-title":"Computing performance benchmarks among cpu, gpu, and fpga. Internet: www. wpi. edu\/Pubs\/E-project\/Available\/E-project-030212-123508\/unrestricted\/Benchmarking Final","author":"Christopher Cullinan T. F.","year":"2013","unstructured":"T. F. Christopher Cullinan , Christopher Wyant . Computing performance benchmarks among cpu, gpu, and fpga. Internet: www. wpi. edu\/Pubs\/E-project\/Available\/E-project-030212-123508\/unrestricted\/Benchmarking Final , 2013 . T. F. Christopher Cullinan, Christopher Wyant. Computing performance benchmarks among cpu, gpu, and fpga. Internet: www. wpi. edu\/Pubs\/E-project\/Available\/E-project-030212-123508\/unrestricted\/Benchmarking Final, 2013."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229323"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008697"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11925-5_6"},{"key":"e_1_3_2_1_10_1","first-page":"267","volume-title":"Third International Symposium, ANTS-III","author":"Hoffstein J.","year":"1998","unstructured":"J. Hoffstein , J. Pipher , and J. H. Silverman . NTRU: A ring-based public key cryptosystem. In Algorithmic Number Theory , Third International Symposium, ANTS-III , Portland, Oregon, USA , June 21-25, 1998 , Proceedings, pages 267 -- 288 , 1998. J. Hoffstein, J. Pipher, and J. H. Silverman. NTRU: A ring-based public key cryptosystem. In Algorithmic Number Theory, Third International Symposium, ANTS-III,Portland, Oregon, USA, June 21-25, 1998, Proceedings, pages 267--288, 1998."},{"key":"e_1_3_2_1_11_1","volume-title":"Goppa codes and the mceliece cryptosystem, august","author":"Jochemsz E.","year":"2002","unstructured":"E. Jochemsz . Goppa codes and the mceliece cryptosystem, august 2002 . E. Jochemsz. Goppa codes and the mceliece cryptosystem, august 2002."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2010.5679887"},{"key":"e_1_3_2_1_13_1","volume-title":"Fast Software Encryption","author":"Chen C. C. C. H. R. N. MS","year":"2010","unstructured":"C. C. C. H. R. N. MS Chen , TR Chen and B. Yang . What price a provably secure stream cipher . In Fast Software Encryption , 2010 . C. C. C. H. R. N. MS Chen, TR Chen and B. Yang. What price a provably secure stream cipher. In Fast Software Encryption, 2010."},{"key":"e_1_3_2_1_14_1","volume-title":"The opencl specification, version 2.0","author":"Munshi A.","year":"2015","unstructured":"A. Munshi and L. Howes . The opencl specification, version 2.0 . Khronos Group , 2015 . A. Munshi and L. Howes. The opencl specification, version 2.0. Khronos Group, 2015."},{"key":"e_1_3_2_1_15_1","volume-title":"Opencl for programming gpus","author":"Pomorski P.","year":"2010","unstructured":"P. Pomorski . Opencl for programming gpus , 2010 . P. Pomorski. Opencl for programming gpus, 2010."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2012.119"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS121102040T"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02384-2_6"},{"key":"e_1_3_2_1_19_1","first-page":"225","volume-title":"Proceedings of the 22nd international conference on Parallel architectures and compilation techniques","author":"Vineeth Mekkat P.-C. Y.","year":"2013","unstructured":"P.-C. Y. Vineeth Mekkat , Anup Holey and A. Zhai . Managing shared last-level cache in a heterogeneous multicore processor . In Proceedings of the 22nd international conference on Parallel architectures and compilation techniques , pages 225 -- 234 . IEEE Press , 2013 . P.-C. Y. Vineeth Mekkat, Anup Holey and A. Zhai. Managing shared last-level cache in a heterogeneous multicore processor. In Proceedings of the 22nd international conference on Parallel architectures and compilation techniques, pages 225--234. IEEE Press, 2013."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2012.6408660"},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2012)","author":"C.-Y.","year":"2012","unstructured":"C.-Y. L. Yu-Shiang Lin and D.-C. Lou. Efficient parallel rsa decryption algorithm for many-core gpus with cuda . In International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2012) , 2012 . C.-Y. L. Yu-Shiang Lin and D.-C. Lou. Efficient parallel rsa decryption algorithm for many-core gpus with cuda. In International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2012), 2012."}],"event":{"name":"INFOS '16: The 10th International Conference on Informatics and Systems","acronym":"INFOS '16","location":"Giza Egypt"},"container-title":["Proceedings of the 10th International Conference on Informatics and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908446.2908491","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2908446.2908491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:13Z","timestamp":1750221553000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908446.2908491"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,9]]},"references-count":21,"alternative-id":["10.1145\/2908446.2908491","10.1145\/2908446"],"URL":"https:\/\/doi.org\/10.1145\/2908446.2908491","relation":{},"subject":[],"published":{"date-parts":[[2016,5,9]]},"assertion":[{"value":"2016-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}