-
6
-
-
85076604136
-
-
F5 BIG-IP SSL Accelerator. http://www.f5.com/products/big-ip/feature-modules/ssl-acceleration.html.
-
F5 BIG-IP SSL Accelerator
-
-
-
11
-
-
85076598217
-
-
OpenSSL Engine. http://www.openssl.org/docs/crypto/engine.html.
-
OpenSSL Engine
-
-
-
12
-
-
85076587045
-
-
Researchers crack 768-bit RSA. http://www.bit-tech.net/news/bits/2010/01/13/researchers-crack-768-bit-rsa/1.
-
Researchers Crack 768-bit RSA
-
-
-
13
-
-
85076619475
-
-
ServerIron ADX Series, Brocade. http://www.brocade.com/products-solutions/products/application-delivery/serveriron-adx-series/index.page.
-
ServerIron ADX Series, Brocade
-
-
-
18
-
-
78149287487
-
-
Netcraft SSL Survey. http://news.netcraft.com/SSL-survey, 2009.
-
(2009)
Netcraft SSL Survey
-
-
-
19
-
-
78149321191
-
-
Netcraft Web Server Survey. http://news.netcraft.com/archives/2010/04/15/april-2010-web-server-survey.html, 2009.
-
(2009)
Netcraft Web Server Survey
-
-
-
21
-
-
77953309886
-
Addressing email loss with suremail: Measurement, design, and evaluation
-
S. Agarwal, V. N. Padmanabhan, and D. A. Joseph. Addressing email loss with suremail: Measurement, design, and evaluation. In USENIX ATC, 2007.
-
(2007)
USENIX ATC
-
-
Agarwal, S.1
Padmanabhan, V.N.2
Joseph, D.A.3
-
24
-
-
84889709075
-
The case for ubiquitous transport-level encryption
-
A. Bittau, M. Hamburg, M. Handley, D. Mazières, and D. Boneh. The case for ubiquitous transport-level encryption. In USENIX Security Symposium, 2010.
-
(2010)
USENIX Security Symposium
-
-
Bittau, A.1
Hamburg, M.2
Handley, M.3
Mazières, D.4
Boneh, D.5
-
28
-
-
0029406556
-
Analysis of sliding window techniques for exponentiation
-
Ç. K. Koç. Analysis of sliding window techniques for exponentiation. Computer and Mathematics with Applications, 30(10):17-24, 1995.
-
(1995)
Computer and Mathematics with Applications
, vol.30
, Issue.10
, pp. 17-24
-
-
Koç, C.K.1
-
30
-
-
33646728555
-
CryptoGraphics: Secret key cryptography using graphics cards
-
D. L. Cook, J. Ioannidis, A. D. Keromytis1, and J. Luck. CryptoGraphics: Secret Key Cryptography Using Graphics Cards. In RSA Conference, Cryptographers Track (CT-RSA), 2005.
-
(2005)
RSA Conference, Cryptographers Track (CT-RSA)
-
-
Cook, D.L.1
Ioannidis, J.2
Keromytis, A.D.3
Luck, J.4
-
31
-
-
38149084490
-
Accelerating SSL using the vector processors in IBMs cell broadband engine for sonys playstation 3
-
N. Costigan and M. Scott. Accelerating SSL using the Vector processors in IBMs Cell Broadband Engine for Sonys Playstation 3. In Cryptology ePrint Archive, Report, 2007.
-
(2007)
Cryptology EPrint Archive, Report
-
-
Costigan, N.1
Scott, M.2
-
36
-
-
68949216895
-
Practical symmetric key cryptography on modern graphics hardware
-
O. Harrison and J. Waldron. Practical Symmetric Key Cryptography on Modern Graphics Hardware. In USENIX Security Symposium, 2008.
-
(2008)
USENIX Security Symposium
-
-
Harrison, O.1
Waldron, J.2
-
40
-
-
84948961359
-
Cox-rower architecture for fast parallel montgomery multiplication
-
Springer
-
S. Kawamura, M. Koike, F. Sano, and A. Shimbo. Cox-rower architecture for fast parallel montgomery multiplication. In Advances in Cryptology-EUROCRYPT 2000, pages 523-538. Springer, 2000.
-
(2000)
Advances in Cryptology-EUROCRYPT 2000
, pp. 523-538
-
-
Kawamura, S.1
Koike, M.2
Sano, F.3
Shimbo, A.4
-
42
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz. Elliptic curve cryptosystems. Mathematics of computation, 48(177):203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
43
-
-
84874743550
-
Encrypting the internet
-
M. E. Kounavis, X. Kang, K. Grewal, M. Eszenyi, S. Gueron, and D. Durham. Encrypting the internet. SIGCOMM Comput. Commun. Rev., 40(4):135-146, 2010.
-
(2010)
SIGCOMM Comput. Commun. Rev.
, vol.40
, Issue.4
, pp. 135-146
-
-
Kounavis, M.E.1
Kang, X.2
Grewal, K.3
Eszenyi, M.4
Gueron, S.5
Durham, D.6
-
45
-
-
84966243285
-
Modular multiplication without trial division
-
P. Montgomery. Modular multiplication without trial division. Mathematics of Computation, 44(170):519-521, 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.1
-
50
-
-
0033115302
-
Analysis of the variable length nonzero window method for exponentiation
-
H. Park, K. Park, and Y. Cho. Analysis of the variable length nonzero window method for exponentiation. Computers & Mathematics with Applications, 37(7):21-29, 1999.
-
(1999)
Computers & Mathematics with Applications
, vol.37
, Issue.7
, pp. 21-29
-
-
Park, H.1
Park, K.2
Cho, Y.3
-
51
-
-
0020194569
-
Fast decipherment algorithm for RSA public-key cryptosystem
-
J.-J. Quisquater and C. Couvreur. Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters, 18(21):905-907, 1982.
-
(1982)
Electronics Letters
, vol.18
, Issue.21
, pp. 905-907
-
-
Quisquater, J.-J.1
Couvreur, C.2
-
53
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
54
-
-
57649106258
-
Larrabee: A many-core x86 architecture for visual computing
-
L. Seiler, D. Carmean, E. Sprangle, T. Forsyth, M. Abrash, P. Dubey, S. Junkins, A. Lake, J. Sugerman, R. Cavin, R. Espasa, E. Grochowski, T. Juan, and P. Hanrahan. Larrabee: a many-core x86 architecture for visual computing. ACM Transactions on Graphics (TOG), 27(3):1-15, 2008.
-
(2008)
ACM Transactions on Graphics (TOG)
, vol.27
, Issue.3
, pp. 1-15
-
-
Seiler, L.1
Carmean, D.2
Sprangle, E.3
Forsyth, T.4
Abrash, M.5
Dubey, P.6
Junkins, S.7
Lake, A.8
Sugerman, J.9
Cavin, R.10
Espasa, R.11
Grochowski, E.12
Juan, T.13
Hanrahan, P.14
-
55
-
-
85076627139
-
Improving SSL handshake performance via batching
-
H. Shacham and D. Boneh. Improving SSL Handshake Performance via Batching. In RSA Conference, 2001.
-
(2001)
RSA Conference
-
-
Shacham, H.1
Boneh, D.2
-
57
-
-
70449131864
-
Corey: An operating system for many cores
-
S. B. Wickizer, H. Chen, R. Chen, Y. Mao, F. Kaashoek, R. Morris, A. Pesterev, L. Stein, M. Wu, Y. Dai, Y. Zhang, and Z. Zhang. Corey: An operating system for many cores. In USENIX OSDI, 2008.
-
(2008)
USENIX OSDI
-
-
Wickizer, S.B.1
Chen, H.2
Chen, R.3
Mao, Y.4
Kaashoek, F.5
Morris, R.6
Pesterev, A.7
Stein, L.8
Wu, M.9
Dai, Y.10
Zhang, Y.11
Zhang, Z.12
-
58
-
-
84931287510
-
Symmetric key cryptography on modern graphics hardware
-
J. Yang and J. Goodman. Symmetric Key Cryptography on Modern Graphics Hardware. In ASIACRYPT, 2007.
-
(2007)
ASIACRYPT
-
-
Yang, J.1
Goodman, J.2
|