[1]Zhang Shu,Chu Yanli.GPU performance computingCUDA[M].Beijing:China Water Power Press,2009.(in Chinese)
[2]Zhu Xingfeng. Design and implementation of efficient IDEA encryption algorithm based on CUDA[J]. Computer and Modernization, 2011(12):4852.(in Chinese)
[3]Addison W.AES encryption and decryption on the GPU [M].GPU Gems 3 GPU Computing, NY:Microsoft Research,2007.
[4]Ye Jian,Li Lixin.Fast implementation of AES based on GPU [J]. Computer Engineering and Design, 2010,31(2):256259.(in Chinese)
[5]Zhang Jili, Dong Xiwei, Xu Shaowen. Security defect of block cipher mode—ECB mode[J]. Science& Technology Information, 2007(28):341:343.(in Chinese)
[6]Yin Xinchun,Chen Weihe,Xie Li.Parallel processing model of the block cipher[J].MINIMICRO SYSTEMS, 2005,26(4):601603. (in Chinese)
[7]Yin Xinchun.Research on parallel cipher[D]. Nanjing:Nanjing University, 2003.(in Chinese)
[8]Fen Dengguo. Status quo and trend of cryptography[J]. Journal of China Institute of Communications,2002,23(5):1825. (in Chinese)
[9]Xia Chunlin, Zhou Deyun, Zhang Kun. CUDA based highefficiency implementation of AES algorithm[J]. Application Research of Computers, 2013,30(6):10971910. (in Chinese)
[10]Wu Wenling, Feng Dengguo. The stateofart of research on block cipher mode of operation[J].Chinese Journal of Computers,2006,29(1):2134.(in Chinese)
[11]Li Chao, Sun Bing, Li Ruilin. Attack method and examples analysis of block cipher[M]. Beijing:Science Press, 2010.(in Chinese)
[12]Wang Yong, Li Shengzhu. Block encryption algorithm based on multiple logistic maps[J]. Computer Engineering, 2007,33(22):162164.(in Chinese)
[13]Vaudenay S.Security flaws induced by CBC padding—applications to SSL,IPSEC,WTLS[C]∥Proc of the International Conference on the Theory and Applications of Cryptographic Techniques,2002:534545.
附中文参考文献:
[1]张舒,褚艳利. GPU高性能运算之CUDA [M].北京:中国水力水电出版社,2009.
[2]朱兴锋.基于CUDA的高效IDEA加密算法设计与实现[J].计算机与现代化,2011,(12):4852.
[4]叶剑,李立新.基于GPU的AES快速实现[J].计算机工程与设计,2010,31(2):256259.
[5]张吉力,董西伟,徐少文.浅谈分组密码算法模式—ECB 模式的安全缺陷[J].科技信息,2007(28):341343.
[6]殷新春,陈伟鹤,谢立.分组密码的并行工作模式[J].小型微型计算机系统,2005,26(4):601603.
[7]殷新春.密码算法并行化研究[D].南京:南京大学,2003.
[8]冯登国.国内外密码学研究现状及发展趋势[J].通信学报,2002,23(5):1825.
[9]夏春林,周德云,张堃.AES算法的CUDA高效实现方法[J].计算机应用研究,2013,30(6):19071910.
[10]吴文玲,冯登国. 分组密码工作模式的研究现状[J].计算机学报,2006,29(1):2134.
[11]李超,孙兵,李瑞林.分组密码的攻击方法与实例分析[M].北京:科学出版社,2010.
[12]王永,李盛竹.基于多个Logistic映射的分组加密算法[J].计算机工程,2007,33(22):162164. |