참고문헌
- H. Feistel, Block Cipher Cryptographic System, U.S. Patent #3,798,359,19 Mar 1974.
- L. R. Knudsen, "Block Ciphers-Analysis,“ Computer Science department, Aarhus University, 1994.
- C. E. Shannon, "Communication theory ofsecrecy system," BSTJ, vol. 28, pp. 656-715, 1949
- NIST, "Federal Information Processing Standards Publication 197 - Specification for the Advanced Encryption Standard (AES)," Available: http://csrc.nist.gov/publication/fips/fips-197.pdf, 2001, [Accessed: Apl 12, 2010]
- J. Daemen, L.Knudsen and V. Rijmen, The block cipher Square, In Fast Software Encryption, Lecture Notes in Computer Science(LNCS) 1267, Springer-Verlag, 1997
- M. Akkar and C. Giraud, "An Implementation of DES and AES, Secure against Some Attacks," CHES 2001, LNCS 2162, pp. 309-318, 2001
- Hoon.Lim "A Revised Version of CRYPTON," Information and Commuications Research Center
- B.Schneier, "The uses and Abuses of Biometrics,"Communications of the ACM, vol 42,no, 8, 1999, p136 https://doi.org/10.1145/310930.310988
- NIST, "Instruction-level Parallelism in AESC andidates"
- NIST,"Data Encryption Standard(DES)", Available:http: //www.itl.nist.gov/fipspubs/fip46-2.htm,1993, [Accessed:Apl2,2010]
- B. Schneier, Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth), 1996
- A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
- N.Goots, B. Izotov, A. Moldovyan, N. Moldovyan, Modern Cryptography: Protect Your Data with Fast Block Ciphers A-LIST Publishing, 2003
- D. Stinson, Cryptography: Theory and Practice, CRC Press, 1995
- Charles H. Bennett, Gilles Brassard, Artur K.Ekert, Quantum Cryptography, Scientific American, October 1992