{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:19:16Z","timestamp":1730269156151,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/ipdps.2018.00069","type":"proceedings-article","created":{"date-parts":[[2018,8,6]],"date-time":"2018-08-06T18:42:01Z","timestamp":1533580921000},"page":"599-609","source":"Crossref","is-referenced-by-count":10,"title":["sDPF-RSA: Utilizing Floating-point Computing Power of GPUs for Massive Digital Signature Computations"],"prefix":"10.1109","author":[{"given":"Jiankuo","family":"Dong","sequence":"first","affiliation":[]},{"given":"Fangyu","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Niall","family":"Emmart","sequence":"additional","affiliation":[]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Weems","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2603974"},{"key":"ref32","first-page":"37","article-title":"On the importance of checking cryptographic protocols for faults","author":"boneh","year":"1997","journal-title":"Adv Cryptology"},{"journal-title":"Wikipedia One-way analysis of variance","year":"2017","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.1995.465359"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8032"},{"journal-title":"HSM-ZJ2014 FIPS 140–2 Non-Proprietary Security Policy","year":"2016","author":"zanjia","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2011.6043261"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2015.69"},{"key":"ref12","first-page":"1","article-title":"SSLShader: cheap SSL acceleration with commodity processors","author":"jang","year":"2011","journal-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-17533-1_31","article-title":"Accelerating rsa with fine-grained parallelism using GPU","volume":"9065","author":"yang","year":"2015","journal-title":"Information Security Practice and Experience"},{"key":"ref14","first-page":"188","article-title":"A GPU parallel implementation of the RSA private operation","author":"cruz-cort\u00e9s","year":"2016","journal-title":"Latin American High Performance Computing Conference"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1007\/978-3-642-01001-9_28","article-title":"ECM on graphics cards","author":"bernstein","year":"2009","journal-title":"Advances in Cryptology-EUROCRYPT 2009"},{"key":"ref16","first-page":"131","article-title":"The billion-mulmod-per-second PC","volume":"9","author":"bernstein","year":"2009","journal-title":"Workshop record of SHARCS"},{"key":"ref17","first-page":"198","article-title":"Exploiting the floating-point computing power of GPUs for RSA","author":"zheng","year":"2014","journal-title":"Information Security - 17th International Conference ISC 2014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3508786"},{"key":"ref19","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"6th Annual International Cryptology Conference"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0898-1221(95)00153-P"},{"journal-title":"Openssl Cryptography and SSL\/TLS Toolkit","year":"2016","key":"ref4"},{"key":"ref27","first-page":"116","volume":"2","author":"knuth","year":"1981","journal-title":"The Art of Computer Programming Seminumerical Algorithms"},{"journal-title":"nShield Connect Data Sheet","year":"2017","key":"ref3"},{"journal-title":"CUDA C programming guide 9 0","year":"2017","key":"ref6"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/40.502403","article-title":"Analyzing and comparing Montgomery multiplication algorithms","volume":"16","author":"ko\u00e7","year":"1996","journal-title":"Micro IEEE"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2017.32"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2010.69"},{"year":"2017","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1007\/978-3-642-02384-2_22","article-title":"Efficient acceleration of asymmetric cryptography on graphics hardware","author":"harrison","year":"2009","journal-title":"Progress in Cryptology - AFRICACRYPT 2009"},{"journal-title":"Digital Signature Standard (DSS)","year":"2013","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"High-speed RSA implementation","year":"1994","author":"ko\u00e7","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/el:19820617"},{"journal-title":"A Timing Attack against RSA with the Chinese Remainder Theorem","year":"2000","author":"schindler","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref26","article-title":"754–2008 IEEE standard for floating-point arithmetic","volume":"2008","author":"committee","year":"2008","journal-title":"IEEE Computer Society Std"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446081"}],"event":{"name":"2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS)","start":{"date-parts":[[2018,5,21]]},"location":"Vancouver, BC","end":{"date-parts":[[2018,5,25]]}},"container-title":["2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8424926\/8425144\/08425213.pdf?arnumber=8425213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T07:18:25Z","timestamp":1643181505000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8425213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2018.00069","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}