References
- M. Dworkin, "Recommendation for block cipher modes of operation: methods and techniques," National Institute of Standards and Technology, Washington, DC, Report No. NIST-SP-800-38A, 2001.
- J. Daemen and V. Rijmen, "AES Proposal: Rijndael," Sep. 1999; http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=802425701A71D9FD462B507C726C7A01?doi=10.1.1.36.640&rep=rep1&type=pdf.
- W. Stallings, Cryptography and Network Security, 2nd ed. Upper Saddle River, NJ: Prentice-Hall, 1999.
- H. M. Heys, "Analysis of the statistical cipher feedback mode of block ciphers," IEEE Transactions on Computers, vol. 52, no. 1, pp. 77-92, 2003. https://doi.org/10.1109/TC.2003.1159755
- US National Bureau of Standards, DES Modes of Operation (FIPS 81). Washington, DC: US Department of Commerce, National Bureau of Standards, 1980.
- M. Dworkin, "Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality," National Institute of Standards and Technology, Washington, DC, Report No. NIST-SP-800-38C, 2004.
- M. Bellare, P. Rogaway, and D. Wagner, "The EAX mode of operation," in Fast Software Encryption. Heidelberg: Springer, 2004, pp. 389-407.
- T. Iwata, K. Kurosawa, "OMAC: one-key CBC MAC," Dec. 2002; http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/omac/omac-spec.pdf.
- D. McGrew and J. Viega, "The Galois/counter mode of operation (GCM)," May 2005; http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-revised-spec.pdf.
- A. A. Adekunle and S. R. Woodhead, "A resourceful combined block cipher mode of operation for packetised network communication," in Proceedings of 2010 4th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST), Amman, Jordan, 2010, pp. 180-185.
- H. M. Heys and L. Zhang, "Pipelined statistical cipher feedback: a new mode for high-speed self-synchronizing stream encryption," IEEE Transactions on Computers, vol. 60, no. 11, pp. 1581-1595, 2011. https://doi.org/10.1109/TC.2010.167
- O. Jung and C. Ruland, "Encryption with statistical self-synchronization in synchronous broadband networks," in Proceedings of the 1st International Workshop on Cryptographic Hardware and Embedded Systems (CHES'99), Worcester, MA,1999, pp. 340-352.
- D. A. McGrew, and J. Viega, "The security and performance of the Galois/Counter Mode (GCM) of operation," in Progress in Cryptology: INDOCRYPT 2004. Heidelberg: Springer, 2005, pp. 343-355.
- W. Stallings, Cryptography and Network Security, 5th ed. Boston, MA: Prentice-Hall, 2011.
- L. R. Knudsen, "Block ciphers: a survey," in State of the Art in Applied Cryptography. Heidelberg: Springer, 1998, pp. 18-48.
- D. Hong, J. Sung, S. Hong, W. Lee, S. Lee, J. Lim, and O. Yi, "Known-IV attacks on triple modes of operation of block ciphers," in Advances in Cryptology: ASIACRYPT 2001. Heidelberg: Springer, 2001, pp. 208-221.
- A. K. Yau, K. G. Paterson, and C. J. Mitchell, "Padding oracle attacks on CBC-mode encryption with secret and random IVs," in Fast Software Encryption. Heidelberg: Springer, 2005, pp. 299-319.
- T. Buchert, L. Nussbaum, and J. Gustedt, "Methods for emulation of multi-core CPU performance," in Proceedings of 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), Banff, Canada, 2011, pp. 288-295.
- A. Desai, K. Ankalgi, H. Yamanur, and S. S. Navalgund, "Parallelization of AES algorithm for disk encryption using CBC and ICBC modes," in Proceedings of 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, 2013, pp. 1-7.
- M. A. Alomari, K. Samsudin, and A. R. Ramli, "A study on encryption algorithms and modes for disk encryption," in Proceedings of 2009 International Conference on Signal Processing Systems, Singapore, 2009, pp. 793-797.