\begin{thebibliography}{99}


\bibitem{Menezes1997}
A. J Menezes, P.C Van Oorschot, S.A Vanstone,
``Handbook of Applied Cryptography'',
CRC Press, 1997,
ISBN: 0849385237


\bibitem{Stallings2010}
W.Stallings,
``Cryptography and Network Security: Principles and Practice'',
Prentice Hall, 2010,
ISBN: 9780136097044

\bibitem{Daemen1999}
J.Daemen, V.Rijmen,
``AES Proposal : Rijndael'',
1998,
\url{http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.640}.


\bibitem{SalmanUlHaq2011}
S.Ul Haq, J.Masood, A.Majeed, U.Aziz,
``Bulk Encryption on GPUs'',
\url{http://developer.amd.com/Resources/documentation/articles/pages/BulkEncryptiononGPUs.aspx},
Retrived 16-09-2012.


\bibitem{WikipediaMD5}
``MD5'',
\url{http://en.wikipedia.org/wiki/MD5},
Retrieved 05-03-2012.


\bibitem{Rivest1992}
R.Rivest,
``The MD5 Message-Digest Algorithm'',
RFC-1321, April 1992.


\bibitem{Akenine-Moller08}
T.Akenine-M\"{o}ller, E.Haines, N.Hoffman,
``Real-Time Rendering 3rd Edition'',
A. K. Peters, 2008,
ISBN: 9871568814247


\bibitem{Owens2007}
J.D Owens, D.Luebke, N.Govindaraju, M.Harris, J.Kr\"{u}ger, A.EvLefohn, T. J Purcell,
``A Survey of General-Purpose Computation on Graphics Hardware'',
Computer Graphics Forum,
Vol.\ 26, No.\ 1,
March 2007,
pp.\ 80-113,
DOI: \href{http://doi.wiley.com/10.1111/j.1467-8659.2007.01012.x}{10.1111/j.1467-8659.2007.01012.x}



\bibitem{Munshi2011a}
A.Munshi, B.Gaster, T.G.Mattson, J.Fung, D.Ginsburg,
``OpenCL Programming Guide'',
Addison Wesley, 2011,
ISBN: 0321749642


\bibitem{Kirk10}
D.B. Kirk, W.W. Hwu,
``Programming Massively Parallel Processors: A Hands-on Approach'',
Morgan kaufmann, 2010,
ISBN: 9780123814722

\bibitem{Nvidia2010}
Nvidia Corporation,
``OpenCL Programming Guide for the CUDA Architecture'',
\url{http://developer.download.nvidia.com/compute/DevZone/docs/html/OpenCL/doc/OpenCL_Programming_Guide.pdf},
Version 4.1, 1-03-2012.



\bibitem{Wu2008}
E.Wu,
``Emerging technology about GPGPU'',
APCCAS'08: IEEE Asia Pacific Conference on Circuits and Systems,
Macao (China), 30 November- 3 December, 2008,
pp.\ 618-622,
DOI: \href{http://dx.doi.org/10.1109/APCCAS.2008.4746099}{10.1109/APCCAS.2008.4746099}


\bibitem{Neelima2010}
B.Neelima, P.S.Raghavendra,
``Recent trends in software and hardware for GPGPU computing: A comprehensive survey'',
ICIIS'10: International Conference on Industrial and Information Systems, 
Mangalore (India), 29 July - 1 August, 2010,
pp.\ 319-324,
DOI: \href{http://dx.doi.org/10.1109/ICIINFS.2010.5578685}{10.1109/ICIINFS.2010.5578685}


\bibitem{Nvidia2010a}
Nvidia Corporation,
``OpenCL Best Practices Guide'',
\url{http://developer.download.nvidia.com/compute/cuda/3_2_prod/toolkit/docs/OpenCL_Best_Practices_Guide.pdf},
27-05-2010.


\bibitem{Kedem1999}
G.Kedem, Y.Ishihara,
``Brute force attack on UNIX passwords with SIMD computer'',
SSYM'99: Proceedings of the 8th conference on USENIX Security Symposium,
Washington D.C., 1999


\bibitem{Carpenter}
P.Carpenter,
``Accelerating Cryptographic Primitives with GPUs'',
\href{http://www.auburn.edu/~carpept/security.pdf}{http://www.auburn.edu/~carpept/security.pdf},
Retrieved 05-03-2012.


\bibitem{Cook2005}
D.Cook, J.Ioannidis, A.Keromytis, J.Luck,
``CryptoGraphics: Secret Key Cryptography Using Graphics Cards'' 
in ``Topics in Cryptology''
editor A. Menezes,
Springer Berlin / Heidelberg,
2005,
pp.\ 334-350,
DOI: \href{http://dx.doi.org/10.1007/978-3-540-30574-3\_23}{10.1007/978-3-540-30574-3\_23}


\bibitem{Harrison2007}
O.Harrison, J.Waldron,
``AES Encryption Implementation and Analysis on Commodity Graphics Processing Units'',
in ``Cryptographic Hardware and Embedded Systems CHES 2007'',
editor P.Paillier, I.Verbauwhede,
Springer Berlin / Heidelberg,
2007,
pp.\ 209-226,
DOI: \href{http://dx.doi.org/10.1007/978-3-540-74735-2\_15}{10.1007/978-3-540-74735-2\_15}


\bibitem{Manavski2007}
S.A Manavski,
``CUDA Compatible GPU as an Efficient Hardware Accelerator for AES Cryptography'',
ICSPC'07: IEEE International Conference on Signal Processing and Communications,
Dubai (United Arab Emirates), 24-27 November, 2007,
pp.\ 65-68,
DOI: \href{http://dx.doi.org/10.1109/ICSPC.2007.4728256}{10.1109/ICSPC.2007.4728256}

\bibitem{Biagio2009}
A.Di Biagio, A.Barenghi, G.Agosta, G.Pelosi,
``Design of a parallel AES for graphics hardware using the CUDA framework'',
IPDPS'09: Symposium on Parallel \& Distributed Processing,
Rome (Italy), 25-29 May, 2009,
pp.\ 1-8,
DOI: \href{http://dx.doi.org/10.1109/IPDPS.2009.5161242}{10.1109/IPDPS.2009.5161242}


\bibitem{Harrison2008}
O.Harrison, J.Waldron,
``Practical symmetric key cryptography on modern graphics hardware'',
SS'08: Proceedings of the 17th conference on Security symposium,
San Jose, CA, 2008,
pp.\ 195--209.


\bibitem{Iwai2010}
K.Iwai, T.Kurokawa, N.Nisikawa,
``AES Encryption Implementation on CUDA GPU and Its Analysis'',
ICNC: First International Conference on Networking and Computing,
Higashi-Hiroshima (Japan), 17-19 November, 2010,
pp.\ 209-214
DOI: \href{http://dx.doi.org/10.1109/IC-NC.2010.49}{10.1109/IC-NC.2010.49}


\bibitem{Tzeng2008}
S.Tzeng, L.Wei,
``Parallel white noise generation on a GPU via cryptographic hash'',
I3D'08: Symposium on Interactive 3D Graphics and Games,
Redwood City (California), 15-17 February, 2008,
pp.\ 79-87,
DOI: \href{http://dx.doi.org/10.1145/1342250.1342263}{10.1145/1342250.1342263}


\bibitem{Zhou2009}
W.Zhou, H.Wu, X.Li, D.Guo,
``Implementations of hardware acceleration for MD4-family algorithms based on GPU'',
ASID'09: 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication,
Hong Kong, 20-22 August, 2009,
pp.\ 571.574,
DOI: \href{http://dx.doi.org/10.1109/ICASID.2009.5277017}{10.1109/ICASID.2009.5277017}

\bibitem{Hu2009}
G.Hu, B.Huang,
``High Throughput Implementation of MD5 Algorithm on GPU'',
ICUT'09: Proceedings of the 4th International Conference on Ubiquitous Information Technologies \& Applications,
Fukuoka (Japan), 20-22 December, 2009
pp.\ 1-5,
DOI: \href{http://dx.doi.org/10.1109/ICUT.2009.5405734}{10.1109/ICUT.2009.5405734}


\bibitem{Hongwei2011}
W.Hongwei, L.Xiangnan, T.Weibin,
``A fast GPU-based implementation for MD5 hash reverse'',
ASID'11: IEEE International Conference on Anti-Counterfeiting, Security and Identification,
24-26 June, 2011,
pp.\ 13-16,
DOI: \href{http://dx.doi.org/10.1109/ASID.2011.5967405}{10.1109/ASID.2011.5967405}

\bibitem{Golubev}
I.Golubev,
``About CPU and GPU usage for password recovery'',
\url{http://www.golubev.com/about\_cpu\_and\_gpu\_2\_en.htm},
Retrieved 14-03-2012.


\bibitem{Vu2011}
A.Vu, J.Han, H.Nguyen, Y.Kim, E.Im,
``A homogeneous parallel brute force cracking algorithm on the GPU'',
ICTC'11: International Conference on ICT Convergence,
Seoul (South Korea), 28-30 September, 2011,
pp.\ 561-564,
DOI: \href{http://dx.doi.org/10.1109/ICTC.2011.6082661}{10.1109/ICTC.2011.6082661}

\bibitem{Engine-cuda}
Engine-CUDA,
\url{http://code.google.com/p/engine-cuda/}.


\bibitem{HashCat}
Hashcat
\url{http://hashcat.net/wiki/}.


\bibitem{Libgpucrypto}
libgpucrypto,
\url{http://shader.kaist.edu/sslshader/libgpucrypto/}


\bibitem{ElcomSoft}
Elcomsoft Lightning Hash Cracker,
\url{http://www.elcomsoft.com/lhc.html}.


\bibitem{RainbowCrack}
RainbowCrack,
\url{http://project-rainbowcrack.com/}.


\bibitem{AMD}
``AMD Fusion Architecture and Llano'',
\url{http://www.realworldtech.com/fusion-llano/2/},
Retrieved 16-09-2012.

%\bibitem{Fernando2004}
%R.Fernando, M.Harris, M.Wloka, C.Zeller,
%``Programming graphics hardware'',
%EG'04 : EUROGRAPHICS 2004,
%Grenoble (France), 2004,
%\url{http://www8.cs.umu.se/kurser/5DV051/HT11/articles/EG_04_TutorialNotes.pdf}.

\bibitem{PCI-SIG}
PCI-SIG,
``PCI-SIG - FAQ - PCI Express 3.0'',
\url{http://www.pcisig.com/news\_room/faqs/pcie3.0\_faq/},
Retrieved 16-09-2012.


%TODO: delete??
%\bibitem{Sanders2010}
%J.Sanders, E.Kandrot,
%``CUDA by Example'',
%Addison-Wesley, 2010,
%ISBN: 9780131387683





\end{thebibliography}
