1 |
A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, Boca Raton, FL: CRC press, 1996.
|
2 |
I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Burlington, MA: Morgan Kaufmann, 2007.
|
3 |
A. Z. Tirkel, G. A. Rankin, R. M. van Schyndel, W. J. Ho, and N. R. A. Mee, "Electronic Watermark," in Proceedings of International Conference on Digital Image Computing Techniques and Applications, pp. 666-672, 1993.
|
4 |
R. C. Gonzalez, R. E. Woods, and S. L. Eddins, Digital Image Processing Using MATLAB, 2nd ed(H. J. Yu, Trans.). Seoul, Korea: McGraw-Hill Korea, 2012.
|
5 |
Korean Standards Association, KS X 1213-1, 128 bit block encryption algorithm ARIA-Part 1: General, 2014.
|
6 |
P. Eliardsson, E. Axell, P. Stenumgaard, K. Wiklundh, B. Johansson, and B. Asp, "Military HF communications considering unintentional platform-generated electromagnetic interference," in Proceedings of International Conference on Military Communications and Information Systems, pp. 1-6, 2015.
|
7 |
H. J. Lee, "Highly reliable synchronous stream cipher system for link encryption," in Proceedings of International Conference on Computational Science and Its Applications, pp. 269-278, 2006.
|
8 |
J. H. Yoon, "A non-periodic random sequence resynchronization method using the address data of LAPB and HDLC," Ph. D. Dissertation, Kyungpook National University, Daegu, Korea, 1997.
|
9 |
V. Smirnova and A. V. Proskurnikov. "Phase locking, oscillations and cycle slipping in synchronization systems," in Proceedings of European Control Conference, pp. 873-878, 2016.
|
10 |
R. J. Sutton, Secure Communications: Applications and Management, Chichester, U.K.: John Wiley & Sons, 2002.
|
11 |
Y. H. Son, J. K. Hong, and K. S. Bae, "Authentication masking code against DoS of T-MAC protocol," Journal of Central South University, vol. 20, no. 7, pp. 1889-1895, Jul. 2013.
DOI
|
12 |
Y. H. Son and K. S. Bae, "Cryptographic synchronization signal generation method using maximal length sequence," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 7, pp. 1401-1410, Jul. 2017.
DOI
|
13 |
A. Ahmad, S. S. Al-Busaidi, M. J. Al-Musharafi, "On properties of PN sequences generated by LFSR - A generalized study and simulation modeling," Indian Journal of Science and Technology, vol. 6, no. 10, pp. 5351-5358, Oct. 2013.
|
14 |
N. S. Abinaya and P. Prakasam. "Performance analysis of maximum length LFSR and BBS method for cryptographic application," in Proceedings of International Conference on Electronics and Communication Systems, pp. 1-5, 2014.
|