1 |
Andreas Pfitzmann and Ralf Abmann. 'Efficient Software Implementations of (Generalized)DES.' SECURICOM '90. 1990
|
2 |
Ralph C. Merkle, 'Fast Software Functions.', CRYPTO '90, 1990
|
3 |
Han Eberle, 'A High-speed DES Implementation for Network Applications.' CRYPTO '92. 1992
|
4 |
Schneirer Bruce. Applied Cryptography, John Wiley & Sons, Inc., 1988, pp. 219-296
|
5 |
E. Biham and A. Shamir. Differential Cryptanalysis of DES-like cryptosystems. In A. J. Menezes and S. A. Vanstone, editors, Proc. CRYPTO 90, pp. 2-21. Springe-Verlag, 1991. Lecture Notes in Computer Science No. 537
|
6 |
128비트 블록 암호 알고리즘(SEED) 개발 및 분석 보고서, 한국정보보호센터, 1999
|
7 |
M. Matsui. Linear Cryptanalysis method for DES cipher. In T. Helleseth, editor, Advanced in Cryptology-Eurocrypt‘93, Vol..765 of Lecture Notes in Computer Science, pp. 386-397, Springer-Verlag, Berlin, 1994
|
8 |
이규원, SEED 블록 암호 알고리즘의 칩 설계 연구, 서울여자대학교, 2000
|
9 |
Zimmermann, A. Curiger, H. Kaeslin, N. Felber, W. Fiehtner, 'A 177Mb/s VLSI Implementation of the International Data Encryption Algorithm.', IEEE Journal of Solid State Circuit, Vol. 29. No. 3, March. 1994
|
10 |
Charles P. Pfleeger. Security in Computing, Prentice Hall. 1989
|
11 |
서영호, 대한민국 표준 128비트 블록 암호 알고리즘의 하드웨어 구현에 관한 연구, 광운대학교, 2000
|
12 |
M. Matsui. The first experimental Cryptanalysis of Data Encryption Standard. In Yvo G. Desmedt, editor, Advances in Cryptology-Crypto'94, vol.839 of Lecture Notes in Computer Science, pp. 1-11, Springer-Verlag, Berlin, 1994
|
13 |
E. Biham and A. Shamir. Differential Cryptanalysis of the full 16-round DES. In Ernest F. Brickell, editor, Proc. CRYPTO 92, pp. 487-496. Springer-Verlag, 1992. Lecture Notes in Computer Science No. 740
|
14 |
신혜진, SEED 암호화 프로세서의 하드웨어 설계 및 구현, 한국항공대학교, 2000
|
15 |
E. Biham and A. Shamir. Differential Cryp tanalysis of FEAL and N-Hash. In D. W. Davies, editor, Advances in Cryptology-Eurocrypt'91, pp.1-16, Springer-erlag, Berlin, 1991
|
16 |
Deborah Williams and Harvey J Hindin, 'Can software do encryption job.', Electronics, 1980. 7
|