1 |
H. No and T. S. Sohn, "NCW," J. KIDA, vol. 5, no. 19, pp. 1046(05-19), May. 2005.
|
2 |
I. S. Choi, "Defense information security in NCW environments," J. Korean Inst. Inform. Sci. Eng. (KIISE), vol. 25, no. 9, pp. 81-88, Aug. 2007.
과학기술학회마을
|
3 |
NIST, "Advanced Encryption Standard(AES)," FIPS PUB 197, Nov. 2001.
|
4 |
C. S. Park and G. Y. Cho, "Generalization of Galois linear feedback register," J. Inst. Electron. Eng. Korea (IEEK), vol. 43C1, no. 1, pp. 1-8, Jan. 2006.
과학기술학회마을
|
5 |
NIST, Papers Submitted to AES3, retrieved Aug, 10, 2013, from http://csrc.nist.gov/archive/aes/round2/conf3/aes3papers.html
|
6 |
National Bureau of Standards, "Data Encryption Standard," FIPS PUB 46, Jan. 1977.
|
7 |
A. Rudra, P. K. Dubey, C. S. Jutla, V. Kumar, J. R. Rao, and P. Rohatgi, "Efficient Rijndael encryption implementation with composite field arithmetic," Lecture Notes Comput. Sci., vol. 2162, pp. 171-184, May 2001.
|
8 |
A. Satoh, S. Morioka, K. Takano, and S. Munetoh, "A compact Rijndael hardware architecture with S-Box optimization," Lecture Notes Comput. Sci., vol. 2248, pp. 239-254, Dec. 2001.
|
9 |
S. Morioka and A. Satoh, "An optimized S-Box circuit architecture for low power AES design," Lecture Notes Comput. Sci., vol. 2523, pp. 172-186, Aug. 2003.
|
10 |
J. M. Grando-Criado, M. A. Vega-Roriguez, J. M. Sanchez-Perez, and J. A. Gomez-Pulido, "A new methodology to implement the AES algorithm using partial and dynamic reconfiguration," Integration, the VLSI J., vol. 43, no. 1, pp. 72-80, Jan. 2010.
DOI
ScienceOn
|
11 |
H. K. Baek, J. S. Lim, and S. M. Jeong, "Technology trend of tactical data link for NCW," The Journal of The Korea Institute of Communication Sciences, vol. 28, no. 7, pp. 59-69, Sep. 2010.
|
12 |
G. Saggese, A. Mazzeo, N. Mazzocca, and A. Strollo, "An FPGA-based performance analysis of the unrolling, tiling, and pipelining of the AES algorithm," Lecture Notes Comput. Sci., vol. 2778, pp. 292-302, Sep. 2003.
|
13 |
P. Hawkes and G. Rose, "Guess-and-determine attacks on SNOW," Lecture Notes Comput. Sci., vol. 2595, pp. 37-46, Aug. 2002.
|
14 |
J. Daemen and V. Rijmen, "The Design of Rijndael," Springer-Verlag, Sep. 2002.
|
15 |
J. Cheon, M. Kim, K. Kim, J. Lee, and S. Kang, "Improved impossible differential cryptanalysis of Rijndael and crypton," Lecture Notes Comput. Sci., vol. 2288, pp. 39-49, Dec. 2001.
|
16 |
S. Hong, S. Lee, J. Lim, J. Sung, D. Cheon, and I. Cho, "Provable security against differential and linear cryptanalysis for the SPN structure," Lecture Notes Comput. Sci., vol. 1978, pp. 273-283, Apr. 2001.
|
17 |
A. Birynkov, "The boomerang attack on 5 and 6-round reduced AES," Lecture Notes Comput. Sci., vol. 3373, pp. 42-57, May. 2004.
|