1 |
Y.J. Baek and J.H. Hwang, 'Improved Algorithms for converting between Boolean Mask and Arithmetic Mask,' to appear in Fourth Conference on Security in Communication Networks(SCN) '04, 2004
|
2 |
A. Satoh, S. Morioka, K. Takano, and S. Munetoh, 'A Compact Rijndael Hardware Architecture with S-Box Optimization,' Advances in Cryptology -ASIACRYPT 2001, LNCS Vol. 2248, pp. 239-254, 2001
DOI
|
3 |
S. Morioka and A. Satoh, 'An Optimized S-Box Circuit Architecture for Low Power AES Design,' Proc. CHES 2002, LNCS Vol. 2523, 172-186, 2002
|
4 |
D.W. Kim, Y.H. Seo, J.H. Kim, and Y.J. Jung, 'Hardware Implementation of 128-Bit Symmetric Cipher SEED,' IEEE AP-ASIC 2000, 2000
|
5 |
P. Kocher, J. Jaffe and B. Jun, 'Differential Power Analysis,' Advances in Cryptology - CRYPTO 1999, LNCS Vol. 1666, pp. 388-397, 1999
|
6 |
Korea Information Security Agency (KISA), SEED Algorithm Specification, available at http://www. kisa.or.kr
|
7 |
National Institute of Standards and Technology (NIST), 'Advanced Encryption Standard (AES),'FIPS Publication 197, Nov. 2001
|
8 |
A. Rudra et al, 'Efficient Rijndael encryption implementation with composite field arithmetic,' Proc. CHES 2001, LNCS Vol. 2162, pp. 175-188, 2001
|