1 |
A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of Applied cryptography, Boca Raton, FL: CRC press, 1996.
|
2 |
W. Stallings and M. P. Tahiliani, Cryptography and Network Security: Principles and Practice (6th edition), London: Pearson, 2014.
|
3 |
H. J. Lee, "Highly reliable synchronous stream cipher system for link encryption," in Proceedings of International Conference on Computational Science and Its Applications, pp. 269-278, 2006.
|
4 |
J. H. Yoon, "A non-periodic random sequence resynchronization method using the address data of LAPB and HDLC," Ph. D. Dissertation, Kyungpook National University, Daegu, Korea, 1997.
|
5 |
G. Ascheid and H. Meyr, "Cycle slips in phase-locked loops: a tutorial survey," IEEE Trans. Communications, vol. 30, no.10, pp. 2228-2241, 1982.
DOI
|
6 |
V. Smirnova and A. V. Proskurnikov, "Phase locking, oscillations and cycle slipping in synchronization systems," in Proceedings of European Control Conference, pp. 873-878, 2016.
|
7 |
P. Eliardsson, E. Axell, P. Stenumgaard, K. Wiklundh, B. Johansson, and B. Asp, "Military HF communications considering unintentional platform-generated electromagnetic interference," in Proceedings of International Conference on Military Communications and Information Systems, pp. 1-6, 2015.
|
8 |
Witvliet, Ben A. and Rosa Ma Alsina-Pages. (2017). Radio communication via Near Vertical Incidence Skywave propagation: an overview. Telecommunication Systems [Online]. pp. 1-15. Available: http://link.springer.com/article/10.1007/s11235-017-0287-2.
|
9 |
R. J. Sutton, Secure Communications: Applications and Management, Chichester, U.K.: John Wiley & Sons, 2002.
|
10 |
S. W. GOLOMB. Digital communications with Space Applications, Englewood Cliffs, NJ: Prentice-Hall, 1964.
|
11 |
A. Ahmad, S. S. Al-Busaidi, M. J. Al-Musharafi, "On properties of PN sequences generated by LFSR - A generalized study and simulation modeling," Indian Journal of Science and Technology, vol. 6, no 10. pp. 5351-5358, Oct. 2013.
|
12 |
F. J. MacWilliams and N. J. A. Sloane, The theory of error correcting codes, Amsterdam: North-Holland, 1977.
|
13 |
N. S. Abinaya and P. Prakasam, "Performance analysis of maximum length LFSR and BBS method for cryptographic application," in Proceedings of International Conference on Electronics and Communication Systems, pp. 1-5, 2014.
|
14 |
Y. H. Son, J. K. Hong and K. S. Bae, "Authentication masking code against DoS of T-MAC protocol," Journal of Central South University, vol. 20, no. 7, pp. 1889-1895, Jul. 2013.
DOI
|