共 19 条
[1]
[Anonymous], IEICE TECHNICAL REPO
[2]
[Anonymous], 2011, CUDA programming guide 3.2
[3]
Biagio A. Di, 2009, IPDPS 2009 P 2009 IE, DOI [10.1109/IPDPS.2009.5161242, DOI 10.1109/IPDPS.2009.5161242]
[4]
Chu X.-W., 2009, PROC OF IFIP NETWORK
[5]
Chu X. -W., 2008, P IEEE IPCCC 08 AUST, P2070
[6]
Dworkin M., 2001, RECOMMENDATION FOR B
[7]
Harrison O., 2008, Proceedings of the 17th USENIX Security Symposium, P195
[8]
Harrison O, 2007, LECT NOTES COMPUT SC, V4727, P209
[9]
Iwai K., 2010, Proceedings 2010 First International Conference on Networking and Computing (ICNC 2010), P209, DOI 10.1109/IC-NC.2010.49
[10]
A Program Behavior Study of Block Cryptography Algorithms on GPGPU
[J].
FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY,
2009,
:33-+