[1]Biham E. How to decrypt or even substitute DESencrypted messages in 228 steps[J]. Information Processing Letters, 2002, 84: 117124.
[2]Biryukov A. Some thoughts on timememorydata tradeoffs[R]. Cryptology ePrint Archive Report 2005/207, LeuvenHeverlee, Belgium: Katholieke Universiteit Leuven, 2005.
[3]Hellman M E. A cryptanalytic timememory tradeoff[J]. IEEE Transactions on Information Theory, 1980, 26: 401406.
[4]Denning D E. Cryptography and data security[M]. USA: AddisonWesley, 1982.
[5]Oechslin P. Making a faster cryptanalytic timememory tradeoff[C]// Boneh D. Advances in Cryptology CRYPTO’03. USA: SpringerVerlag, 2003: 617630.
[6]Mentens N, Batina L, Preneel B, et al. Cracking Unix passwords using FPGA platforms[C]// Gerhard Frey(ed.). SHARCS’05, In Proceedings of the Workshop on Special Purpose Hardware for Attacking Cryptographic Systems. France: [s.n.], 2005.
[7]Kumar S, Paar C, Pelzl J, et al. How to break DES for 8,980[C]// Daniel J. B(ed.). SHARCS’06, In International Workshop on SpecialPurpose Hardware for Attacking Cryptographic Systems. Germany: [s.n.], 2006.
[8]Owens J D, Luebke D, Govindaraju N, et al. A survey of generalpurpose computation on graphics hardware[J]. Computer Graphics Forum, 2007, 26(1):80113.
[9]Che S, Boyer M, Meng J, et al. A performance study of general purpose applications on graphics processors using CUDA[J]. Journal of Parallel and Distributed Computing, 2008, 68(10):13701380.
[10]NVIDIA Corporation. CUDA Programming Guide[EB/OL]. (2010)[20100901].http://developer.nvidia.com/cuda.
[11]OpenSSL Open Source Project. Openssl[EB/OL]. (2010)[20100901].http://www.openssl.org. |