References
- Date Integrity and Security Marc Farley;Tom Stearns;Jeffrey Hsu
- APPLIED CRYPTOGRAPHY Bruce Schneier
- Network and Internetwork Security Principles and Practice William Stallings
- Advances in Cryptology-Euro-crypt '93 LNCS 765 On the security of the IDEA block cipher W. Meier;T. Helleseth(ed.)
- Advances in Cryptology-- CRYPTO '96 Key-Schedule Crypt analysis of 3-WAY, IDEA, G-DES, RC4, SAFER, and Triple-DES Kelsey, B. Schneier;D. wagner
- Technical Report ESAT-COSIC Report 96-2 Differential-Linear Crypt-analysis of IDEA J. Borst
- 26th ACM/IEEE Design Automation VHDL Synthesis Using Structured Modeling Joseph S. Lis;Daniel D. Gajski
- 26th ACM/IEEE Design Automation Behavioral Modeling of Transmission Gates in VHDL Steven S. Leung
- IEEE Transactions on VLSI system v.3 no.2 Performance-Oriented Technology Mapping for LUT-Based FPGAs H. Shin;C. Kim
- Advances in Cryptology-Proc. Eurocrypt '93, LNCS 773 Weak keys for IDEA J. Daemen;R. Govaerts;J. Vandewalle;T. Helleseth(ed.)
- Technical Report ESAT-COSIC Report 94-1 Cryptanalysis of 2.5 rounds of IDEA J. Daemen;R. Govaerts;J. Vandewalle
- 26th ACM/IEEE Design Automation VCOMP : A VHDL Composition System Faul R. Jordan;Ronald D. Williams
- Ciruite Integrate Digitale G. Toacse;D. Nicula
- Proceeding of the 1992 ASIC Conf. and Ex. Using VHDL for model and design of processing unit Z. Navadi