References
- AES site in http://csrc.nist.gov/ encryption/aes/.
- NESSIE site in https://www.cosic.esat. taileuven.ac.be/nessie/.
- J. Daemen, V. Rijmen, 'The Block Cipher Rijndael,' Smart Card Research and Applications, LNCS 1820, J.-J. Quisquater and B. Schneier, Eds., Springer-Verlag, 2000, PP. 288-296
- L. Simpson, E. Dawson, J. Dj. Golic and W. Millan, 'LILI Keystream Generator,' Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology SAC'2OOO toappare in Springer- Verlag LNCS, 2000
- Sober-t16 in https://www.cosic.esat. kuleuven. ac.be/nessie/workshoP/submission.html.
- Hoonjae Lee, Sangjae Moon, 'Parallel Stream Cipher for Secure High-Speed Communi-cations,' Signal Processing, Vol. 82, No.2, pp.259-265, Feb. 2002 https://doi.org/10.1016/S0165-1684(01)00180-3
- B. Schneier, Applied Cryptography, 2nd Ed., Jhon Wiley & Sons, Inc., 1996
- R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986
- R. A. Rueppel, 'Correlation Immunity and the Summation Generator,' Advances in Cryptology, Proceedings of CRYPT0'85, pp.260-272, 1985
- Hoonjae Lee, Sangjae Moon, 'On An Improved Summation Generator with 2-Bit Memory,' Signal Processing, Vol. 80, No.l pp. 211-217, Jan. 2000 https://doi.org/10.1016/S0165-1684(99)00123-1
- W. Meier and O. Staffelbach, 'Correlation Properties of Combiners with Memory in Stream Ciphers,' Joumal of Cryptology, Vol.5, pp.67- 86, 1992
- T. Siegenthaler, 'Correlation- Immunity of Nonlonear Combining Functions for Cryptographic Applications,' IEEE Trans. on Infor. Theo., Vol. IT-30, No. 5, PP. 776- 780, Sep. 1984
- X. G. Zhen and J.L. Massey, 'A Spectral Characterization of Correlation-Immune Combining Functions,' IEEE Trans. on Infor. Theo., Vo1.34, No-3, May 1988
- B. Park, H. Choi, T. Chang and K. Kang, 'Period of Sequences of Primitive Polynomials,' Electronics Letters, Vol. 29, No. 4, pp. 390-391, Feb. 1993 https://doi.org/10.1049/el:19930262
- 이훈재, 문상재, 'FPGA/VHDL을 이용한LILI-128 암호의 고속화 구현에 관한 연구,' 한국통신정보보호학회논문지 제11권, 제3호pp.23-32, 2001년 6월호