1 |
L. R. Knudsen, "Block Ciphers-Analysis, Dsign and Applications," Ph.D Thesis, Computer Science department, Aarhus University, 1994.
|
2 |
C. H. Bennett and G. Brassard, In proceedings of IEEE INternational Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), p.75.
|
3 |
P. Dusart, G. Letourneux, and O. Vivolo, "Differential Fault Analysis on A.E.S", http://eprint.iacr.org/2003/ 010.pdf
|
4 |
NIST, "Federal Information Processing standards Publication 197-Specification for the Advanced Encryption Standard (AES)"
|
5 |
http://csrc.nist.gov/publications/fips/fips-197.pdf, 2001 level Parallelism in AES Candidates.
|
6 |
NIST, "Data Encryption Standard(DES)", http://www.itl.nist.gov/fipspubs/fip46-2.htm
|
7 |
B. Schneier, Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth), 1996.
|
8 |
A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
|
9 |
N.Goots, B. Izotov, A. Moldovyan, N. Moldovyan, Modern Cryptography: Protect Your Data with Fast Block Ciphers, A-LIST Publishing, 2003.
|
10 |
D. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.
|
11 |
Charles H. Bennett, Gilles Brassard, Artur K. krt, Quantum Cryptography, Scientific American, October 1992.
|