Author:
Jo Heeseung,Hong Seung-Tae,Chang Jae-Woo,Choi Dong Hoon
Reference15 articles.
1. Che, S., Boyer, M., Meng, J.,Tarjan, D., Sheaffer, J.W. and Skadron, K. A performance studyofgeneralpurpose applications on graphics processors using CUDA. Journal of Parallel and Distributed Computing, 68, 10,2008, 1370-1380.
2. Manavsk:i, S.A. CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In Proceedings of the IEEE Int’l Conf on Signal Processing and Communication (ICSPC 2007), 2007,65-68.
3. Cook, D.L. and Keroymytis, A.D. Cryptographies: Exploiting Graphics Cards for Security, Advancements inInformation Security series, Springer, 2006.
4. Elovici, Y., Waisenberg, R., Shmueli, E. and Oudes, E. A Structure Preserving Database Encryption Scheme. Lecture Notes in Computer Science, Vol. 3178, 2004, 449-455.
5. Mehrotra, S., Hacigumus, H. and Iyer, B. Efficient Execution of Aggregration Queries over Encrypted Relation Databases. In Proceedings ofDASFAA, 2004, 125-136.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献