1 |
William Stalings, 'Network and Internetwork Security,' Principls and Practices, 4 Edition
|
2 |
K.Chen, M.Henrickesen, W.Millan, J.Fuller, L.Simpson, E.Dawon, H.Lee, and S.Moon, 'Dragon:A Fast Word Based Stream Cipher,' eSTREAM, ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream
|
3 |
Federal Information Processing Standards (FIPS) , 'Advanced Encryption Standard (AES), 'NIST, Technical Report 197, November 2001
|
4 |
The eSTREAM web site. 'eSTREAM, ECRYPT Stream Cipher Project,' http://www.ecrypt.eu.org/st ream
|
5 |
T.Good, W.Chelton and M.Benaissa, 'Review of stream cipher candidates from a low resource hardware perspective,' eSTREAM, ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream
|
6 |
Philippe Bulens, Kassem Kalach, Franqois-Xavier Standaert and Jean-Jacques Quisquater, 'FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile,' eSTREAM, ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream
|
7 |
이훈재, 문상재, 'LILI-II 스트림 암호의 고속화 구현에 관한 연구,' 한국통신학회논문지 '04-8 Vol.29 No.8C
|
8 |
Marcin Rogawski, PROKOM software S.A, 'Hardware evaluation of eSTREAM Candidates: Grain., Lex, Mickey128, Salsa20 and Trivium,' eSTREAM, ECRYPT Stream Cipher Project, http://www.ecrypt. eu.org/stream
|
9 |
Markus Kasper, Sandeep Kumar and Kerstin Lemke-Rust 'A Compact Implementation of Edon80,' eSTREAM, ECRYPT Stream Cipher Project, http://www. ecrypt.eu.org/stream
|