[1]Biham E. How to decrypt or even substitute DESencrypted messages in 228 steps[J]. Information Processing Letters, 2002, 84: 117124.[2]Biryukov A. Some thoughts on timememorydata tradeoffs[R]. Cryptology ePrint Archive Report 2005/207, LeuvenHeverlee, Belgium: Katholieke Universiteit Leuven, 2005.[3]Hellman M E. A cryptanalytic timememory tradeoff[J]. IEEE Transactions on Information Theory, 1980, 26: 401406.[4]Denning D E. Cryptography and data security[M]. USA: AddisonWesley, 1982.[5]Oechslin P. Making a faster cryptanalytic timememory tradeoff[C]// Boneh D. Advances in Cryptology CRYPTO’03. USA: SpringerVerlag, 2003: 617630.[6]Mentens N, Batina L, Preneel B, et al. Cracking Unix passwords using FPGA platforms[C]// Gerhard Frey(ed.). SHARCS’05, In Proceedings of the Workshop on Special Purpose Hardware for Attacking Cryptographic Systems. France: [s.n.], 2005.[7]Kumar S, Paar C, Pelzl J, et al. How to break DES for 8,980[C]// Daniel J. B(ed.). SHARCS’06, In International Workshop on SpecialPurpose Hardware for Attacking Cryptographic Systems. Germany: [s.n.], 2006.[8]Owens J D, Luebke D, Govindaraju N, et al. A survey of generalpurpose computation on graphics hardware[J]. Computer Graphics Forum, 2007, 26(1):80113. [9]Che S, Boyer M, Meng J, et al. A performance study of general purpose applications on graphics processors using CUDA[J]. Journal of Parallel and Distributed Computing, 2008, 68(10):13701380.[10]NVIDIA Corporation. CUDA Programming Guide[EB/OL]. (2010)[20100901].http://developer.nvidia.com/cuda.[11]OpenSSL Open Source Project. Openssl[EB/OL]. (2010)[20100901].http://www.openssl.org. |