1 |
National Bureau of Standards, DES Modes of Operation, Federal Information Processing Standard Publication FIPS 81, December 1980
|
2 |
Young Kyu Kang, Dae Won Kim, Taek Won, and Jun Rim Choi, 'An Efficient Implementation of Hash Algorithm for IPSEC', Asia Pacific Conference on ASIC 2002, pp.93-96, August, 2002
|
3 |
William Stalling, Cryptography and Network Security, Prentice Hall, 1999
|
4 |
Joan Daemen and Vincent Rijmen, The Design of Rijndael; Springer, 2002
|
5 |
Phillip Rogaway, M. Bellare, and T.Krovetz., 'OCB:A Block-Cipher Mode of Operation for Efficient Authenticated Encryption', 8th ACM conference on computer and communications security(CCS-8), ACM Press, 2001
|
6 |
SCI-WORX, 'High Speed MD5 Hash Engine', http://www.sci-worx.com/
|
7 |
최병윤, 박영수, 전성익, '모듈화된 라운드 키 생성회로를 갖는 AES 프로세서의 설계', 정보보호학회 논문지, vol.12, no.5, pp.15-25, 2002. 10
|
8 |
D. Whiting, etc, 'Counter with CBC-MAC(CCM)', Network Working Group RFC3610, September, 2003
|
9 |
V. G. Oklobdzija, 'An Algorithm and novel design of a leading zero detector circuit : comparison with logic synthesis', IEEE transaction on VLSI systems, vol.2, no.1, pp.124-128, 1993
|
10 |
Henry Kuo and Ingrid Verbauwhede, 'Architectural Optimization for a 1.82 Gbits/sec VLSI Implementation of the AES Rijndael Algorithm', CHESS 2001, pp,51-64 2001
|
11 |
Samsung Electronics, 'STD90/MDL90 0.35um 3.3V CMOS standard cell library for pure logic/ MDL Products', 2000
|
12 |
박창섭, 암호이론과 보안, 대영사, 1999
|