참고문헌
- 이흥섭 외. '정보보호기술개발 - 128비트 블록 암호알고리즘 (SEED) 개발 및 분석 보고서 (http://www.kisa.or.kr/technology/sub1/128-seed.pdf)'. 한국정보보호센터, 1998. 12
- 박성준, '국내 표준 블록 암호알고리즘(SEED) 활용방법'. 제4회 정보보호 심포지움(SIS '99). 한국정보보호센터, pp. 575~599. 1994.4
- 장청룔 외, 'SEED의 ISO/IEC 국제표준화 추진', 한국정보보호진흥원. 2001. 11
- 장청룔, '블록 암호 SEED의 국제표준화', 경동논총, 경동대학교 대학교육문화원. 2003. 12
- 정보통신단체표준(TT A. KO-12. 0004), http://www.kisa.or.kr/evaluation/webdri ver?MIval = hh_3_tta
- SEED, http://www.kisa.or.kr/seed/index.html
- B. Preneel. B. Van Rompay, S. B, Ors, A. Biryukov, J. Granboulan, E. Dottax, M. Dichtl, M. Schafheutle, P. Serf, S, Pyka, E. Biham, E. Barkan, O. Dunkelman, J. Stolin, M. Ciet, J-J. Quisquater, F, Sica, . Raddum, M. Parker, Performance of Optimized Implementations of the ESSlE Primitives', NESSIE, February 20th, 2003
- CRYPTREC, 暗號技術評價報告書(2002年度) (CRYPTREC Report 2002), http://www.ipa. go,j p/securi ty/ enc/CRYPTREC/fy15/doc/c02_2 .pdf
- NESSIE project description, http://www.cosic.esat.kuleuven. ac. bel nessie/
- ISO/lEC JTC1/SC27 , 'ISO/lEC 9979 Register of Cryptographic Algorithms', http://www.din.de/ni/sc27/doc7 .html#9979
- ISO/lEC JTClISC27, 'A Call for Contributions to a New Work Item Proposal on "Encryption Algorithms', ISO/lEC JTCl/SC27 N2477, 1999. 12
- ISO/lEC JTC1/SC27, 'Summary of Voting on JTC1 N6009(SC27 N2488), Proposal for a New Work Item Proposal on Encryption Algorithms(JTC1 N6112)', ISO/IEC JTCl/SC27 N2521, 2000. 3
- ISO/lEC JTC1/SC27, 'National BodyContributions on NP 18033 'Encryption Algorithms' in response to SC27 N2563(ATT. 3 Korean Contribution)", ISO/lEC JTCl!SC27 N2656r1 (n2656_3.zip), 2000.10
- ISO/lEC JTC1/SC27 , 'Resolutions of the 21st meeting of SC 27/WG 2', ISO/lEC JTCl/SC27 N2720(SC27/WG2 N463) , 2000.10
- ISO/lEC JTC 1/SC 27, 'Third Party Evaluation on SEED by CRYPTREC', ISO/ lEC JTC 1/SC 27 N3213, 2002, 4
- ISO/lEC JTCl!SC27, 'Resolutions of the 28th meeting in Singapore of SC 27/WG 2', ISO/ lEC JTC1/SC27 N4026, 2004. 4
- ISO/lEC JTC1/SC27, 'Summary of Voting on Selection of Algorithms to ISO/lEC 18033-3 Information technology-Security techniques - Encryption Algorithms-Part 3: Bloch ciphers', ISO/lEC JTC1/SC27 N3901rev1 att2 (Juastification for Inclusion of SEED in ISO/ IEC 18033-3), 2004. 4
- ISO/lEC JTC1/SC27, 'Disposition of comments received on document SC27 N3737revl - ISO /lEC 1st WD 14888-3, IT security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms (revision)', ISO/lEC JTC1/SC27 N3968, 2004. 4
- ISO/lEC JTC1/SC27, 'Dispositions of comments received on document SC27 N3752 ISO/lEC 3rd CD 18033-3 - IT Security techniques Encryption algorithms - Part 3: Block ciphers, ISO/lEC JTC1/SC27 N3978, 2004. 5
- ISO/lEC JTC1/SC27, 'Disposition of comments received on document SC27 N3741 ISO/lEC 3rd WD 11770-4 - IT Security techniques - Key management Part 4: Mechanisms based on weak secrets(ref. document Summary of Voting SC27 N3894), ISO/lEC JTCl/SC27 N3970, 2004. 5