메뉴 건너뛰기




Volumn 20, Issue , 2006, Pages 1-136

CryptoGraphics: Exploiting graphics cards for security

Author keywords

[No Author keywords available]

Indexed keywords


EID: 67650676586     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (4)

References (92)
  • 6
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptgraphic Protocols for Faults
    • Boneh, Demillo, and Lipton. On the Importance of Checking Cryptgraphic Protocols for Faults. In Proceedings of Advances in Cryptology-Eurocrypt, pages 37-51, 1997.
    • (1997) Proceedings of Advances in Cryptology-Eurocrypt , pp. 37-51
    • Boneh, D.1    Lipton2
  • 8
    • 70149090236 scopus 로고    scopus 로고
    • I. Buck. BrookGPU. http://graphics.stanford.edu/projects/brookgpu/index.html, 2003.
    • (2003) BrookGPU
    • Buck, I.1
  • 9
    • 84882716199 scopus 로고    scopus 로고
    • Spy ware and Rootkits-The Future Convergence
    • December
    • J. Butler and S. Sparks. Spy ware and Rootkits-The Future Convergence. USENIX;login:, 29(6):8-15, December 2004.
    • (2004) USENIX;login , vol.29 , Issue.6 , pp. 8-15
    • Butler, J.1    Sparks, S.2
  • 16
    • 33646729274 scopus 로고    scopus 로고
    • Remotely Keyed Cryptographies-Secure Remote Display Access Using (Mostly) Untrusted Hardware
    • In, December
    • D. Cook, R. Baretto, and A. Keromytis. Remotely Keyed Cryptographies-Secure Remote Display Access Using (Mostly) Untrusted Hardware. In Proceedings of ICICS, pages 363-375, December 2005.
    • (2005) Proceedings of ICICS , pp. 363-375
    • Cook, D.1    Baretto, R.2    Keromytis, A.3
  • 32
    • 33645588714 scopus 로고    scopus 로고
    • Helion Technology Limited, AES (Rijndael) Core
    • Helion Technology Limited. High Performance Solutions in Silicon, AES (Rijndael) Core, http://www.heliontech.com/core2.htm, 2003.
    • (2003) High Performance Solutions in Silicon
  • 33
    • 0041973497 scopus 로고    scopus 로고
    • Paclcet Leashes: A Defense against Wormhole Attacks in Wireless Networks
    • In, April
    • Y.-C. Hu, A. Perrig, and D. B. Johnson. Paclcet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In Proceedings of IEEE Infocomm, April 2003.
    • (2003) Proceedings of IEEE Infocomm
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 35
    • 84974760753 scopus 로고
    • The Importance of Non-Data Touching Processing Overheads in TCP/IP
    • In, September
    • J. Kay and J. Pasquale. The Importance of Non-Data Touching Processing Overheads in TCP/IP. In Proceedings ACM SIGCOMM Conference, pages 259-269, September 1993.
    • (1993) Proceedings ACM SIGCOMM Conference , pp. 259-269
    • Kay, J.1    Pasquale, J.2
  • 40
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems
    • P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In Proceedings of Advances in Cryptology-Crypto, pages 104-113, 1996.
    • (1996) Proceedings of Advances in Cryptology-Crypto , pp. 104-113
    • Kocher, P.1
  • 42
    • 35248861095 scopus 로고    scopus 로고
    • Architectual Optimization for 1.82 Gbits/sec VLSI Implementation of Rijndael Algorithm
    • H. Kuo and I. Verbauwhede. Architectual Optimization for 1.82 Gbits/sec VLSI Implementation of Rijndael Algorithm. In Proceedings of CHES, pages 51-64, 2001.
    • (2001) Proceedings of CHES , pp. 51-64
    • Kuo, H.1    Verbauwhede, I.2
  • 43
    • 85011105685 scopus 로고
    • A Proposal for a New Block Encryption Standard
    • X. Lai and J. Massey. A Proposal for a New Block Encryption Standard. In Proceedings of EUROCRYPT1990, pages 389-404, 1991.
    • (1991) Proceedings of EUROCRYPT1990 , pp. 389-404
    • Lai, X.1    Massey, J.2
  • 44
    • 10944240574 scopus 로고    scopus 로고
    • Interface Illusions
    • November/December
    • E. Levy. Interface Illusions. IEEE Security & Privacy, 2(6):66-69, November/December 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.6 , pp. 66-69
    • Levy, E.1
  • 47
    • 0142103318 scopus 로고    scopus 로고
    • The GPU Enters Computing's Mainstream
    • October
    • M. Macedonia. The GPU Enters Computing's Mainstream. IEEE Computer Magazine, pages 106-108, October 2003.
    • (2003) IEEE Computer Magazine , pp. 106-108
    • Macedonia, M.1
  • 50
    • 84944878412 scopus 로고    scopus 로고
    • High Performance Single Chip FPGA Rijndael Algorithms Implementations
    • M. McLoone and J. McConny. High Performance Single Chip FPGA Rijndael Algorithms Implementations. In Proceedings of CHES, pages 65-76, 2001.
    • (2001) Proceedings of CHES , pp. 65-76
    • McLoone, M.1    McConny, J.2
  • 51
    • 15944399510 scopus 로고    scopus 로고
    • Microsoft
    • Microsoft. Microsoft DirectX, http://www.microsoft.com/windows/directx/d e f a u l t. a s p x.
    • Microsoft DirectX
  • 54
    • 2442545605 scopus 로고    scopus 로고
    • Measuring Thin-Client Performance Using Slow-Motion Benchmarking
    • Feb
    • J. Nieh, S. J. Yang, and N. Novik. Measuring Thin-Client Performance Using Slow-Motion Benchmarking. ACM Transactions on Computer Systems (TOCS), 21(1):87-115, Feb. 2003.
    • (2003) ACM Transactions on Computer Systems (TOCS) , vol.21 , Issue.1 , pp. 87-115
    • Nieh, J.1    Yang, S.J.2    Novik, N.3
  • 58
    • 84882700565 scopus 로고    scopus 로고
    • OpenGL Organization
    • OpenGL Organization. OpenGL. h t t p://www. opengl. org, 2005.
    • (2005) OpenGL
  • 62
    • 58249143610 scopus 로고    scopus 로고
    • editor., Addison-Wesley
    • M. Pharr, editor. GPU Gems2. Addison-Wesley, 2005.
    • (2005) GPU Gems2
    • Pharr, M.1
  • 64
    • 0005097206 scopus 로고    scopus 로고
    • Digital Rights Management (DRM) Architectures
    • June
    • R. lannella. Digital Rights Management (DRM) Architectures. D-Lib Magazine, 1(6), June 2001.
    • (2001) D-Lib Magazine , vol.1 , Issue.6
    • Lannella, R.1
  • 66
    • 0004102023 scopus 로고    scopus 로고
    • Rivest, Robshaw, Sidney, and Yin
    • Rivest, Robshaw, Sidney, and Yin. RC6 Block Cipher, http://www.rsasecurity. com/rsalabs/node.asp?id=2512, 1998.
    • (1998) RC6 Block Cipher
  • 67
    • 4143075680 scopus 로고
    • The RC5 Encryption Algorithm
    • R. Rivest. The RC5 Encryption Algorithm. CryptoBytes, 1(1), 1995.
    • (1995) CryptoBytes , vol.1 , Issue.1
    • Rivest, R.1
  • 68
    • 84956864062 scopus 로고    scopus 로고
    • A Stream Cipher Based on Linear Feedback Over GF (28)
    • G. Rose. A Stream Cipher Based on Linear Feedback Over GF (28). In Information Security and Privacy LNCS 1438, page 135ff, 1998.
    • (1998) Information Security and Privacy LNCS 1438 , pp. 135
    • Rose, G.1
  • 79
    • 84942211537 scopus 로고
    • Giving Applications Access to Gb/s Networking
    • July
    • J. M. Smith and C. B. S. Traw. Giving Applications Access to Gb/s Networking. IEEE Network, 7(4):44-52, July 1993.
    • (1993) IEEE Network , vol.7 , Issue.4 , pp. 44-52
    • Smith, J.M.1    Traw, C.B.S.2
  • 80
    • 33745194484 scopus 로고
    • Cryptographic Support for a Gigabit Network
    • In, June
    • J. M. Smith, C. B. S. Traw, and D. J. Farber. Cryptographic Support for a Gigabit Network. In Proceedings of INET, pages 229-237, June 1992.
    • (1992) Proceedings of INET , pp. 229-237
    • Smith, J.M.1    Traw, C.B.S.2    Farber, D.J.3
  • 81
    • 7244254277 scopus 로고    scopus 로고
    • Magic Boxes and Boots: Security in Hardware
    • October
    • S. Smith. Magic Boxes and Boots: Security in Hardware. IEEE Computer, 37(10): 106-109, October 2004.
    • (2004) IEEE Computer , vol.37 , Issue.10 , pp. 106-109
    • Smith, S.1
  • 84
    • 21644486314 scopus 로고    scopus 로고
    • Trusted Computing Group, version 1.2, April 2004
    • Trusted Computing Group. TCG Specification Architecture Overview, version 1.2. https:www. trustedcomputinggroup. org/home, April 2004.
    • TCG Specification Architecture Overview
  • 86
    • 84882647396 scopus 로고    scopus 로고
    • Ziff-Davis, Inc
    • Veritest. i-Bench version 1.5, Ziff-Davis, Inc, 2004. http://www.veritest.com/benchmarks/i-bench/.
    • (2004) Veritest. i-Bench version 1.5
  • 87
    • 20844455974 scopus 로고    scopus 로고
    • Challenges in Securing Voice over IP
    • May/June
    • T. J. Walsh and D. R. Kuhn. Challenges in Securing Voice over IP. IEEE Security & Privacy Magazine, 3(3):44-49, May/June 2005.
    • (2005) IEEE Security & Privacy Magazine , vol.3 , Issue.3 , pp. 44-49
    • Walsh, T.J.1    Kuhn, D.R.2
  • 91
    • 0004196480 scopus 로고
    • PhD thesis, Carnegie Mellon University
    • B. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, 1994.
    • (1994) Using Secure Coprocessors
    • Yee, B.1
  • 92
    • 26844473089 scopus 로고    scopus 로고
    • Parallel Genetic Algorithms in Programmable Graphics Hardware
    • Q. Yu, C. Chen, and Z. Pan. Parallel Genetic Algorithms in Programmable Graphics Hardware. In Proceedings of ICNC, pages 1051-1059, 2005.
    • (2005) Proceedings of ICNC , pp. 1051-1059
    • Yu, Q.1    Chen, C.2    Pan, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.