1 |
Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T. 2000. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Selected Areas in Cryptography, pp. 39-56.
|
2 |
ARIA. http://www.nsri.re.kr.
|
3 |
NIST. 2001. Announcing the Advanced Encryption Standard (AES). FIPS-197
|
4 |
Beker, H.J., and Piper, F.C. 1985. Secure Speech Communications. Academic Press, London.
|
5 |
A.J. Menezes, P.C. Oorschot and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
|
6 |
J. L. Massey, "Shift-Register Synthesis and BCH Decoding," IEEE Trans. on Infor. Theo., Vol. IT-15, No. 1, pp. 122-127, Jan. 1969.
|
7 |
A. Biryikov and A. Shamir, "Cryptanalytic Time/Memory/Data Tradcoffs for Stream Ciphers", Advances in Cryptology, Proceedings of ASIACRYPT00, LNCS 1976, pp.1-13, 2000.
|
8 |
Chen, K., Henrickson, M., Millan, W., Puller, J., Simpson, A., Dawson, E., Lee, H., Moon, S. 2004. Dragon: A Fast Word Based Stream Cipher. LNCS Vol. 3506 (ICISC'2004), pp.414-431.
|
9 |
Clark, A., Dawson, E., Fuller, J., Golic, J., Lee, H., Millan, W., Moon, S., Simpson, L. 2002. The LlLl-H Keystream Generator. LNCS Vol. 2384(ACISP'2002), pp.25-39.
|
10 |
Lee, H., Moon, S. 2002. Parallel Stream Cipher for Secure High-Speed Communications. Signal Processing Vol.82, No.2, pp.259-265.
DOI
ScienceOn
|
11 |
F. P. Preparata and M. I. Shames, Computational Geometry: An Introduction, Springer-Velag, 1985.
|
12 |
Lee, H., Chen, K. 2007. PingPong-128, An New Stream Cipher for Ubiquitous Application. IEEE CS (ICCIT 2007), pp.1893-1899.
|
13 |
Lee, H. 1997. An Improved Synchronous Stream cipher system for a Link Encryption. PhD thesis in KyungPook National University, Daegu, Korea.
|
14 |
Tilborg, H.C.A. 2000. Fundamentals of Cryptology. Kluwer Academic Publishers.
|
15 |
Menezes, A., Oorschot, P. Van, Vanstone, S. 1997. Handbook of Applied Cryptography, CRC Press.
|