1 |
M. Nagendra and M. Chandra Sekhar, "Performance Improvement of Advanced Encryption Algorithm using Parallel Computation," International Journal of Software Engineering and Its Applications, vol. 8, no. 2, pp. 287-296, 2014.
DOI
|
2 |
XILINX, "Vivado Design Suite Tutorial: Using Constraints," April 2018. [Online]. Available: https://www.xilinx.com/support/documentation/sw_manuals/xilinx2018_1/ug945-vivado-using-constraints-tutorial.pdf.
|
3 |
Elaine Barker, William Barker and William Burr, "NIST Special Publication 800-57: Recommendation for Key Management - Part 1: General(Revision 3)," July 2012. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-57p1r3.pdf.
|
4 |
National Institute of Standards and Technology, "NIST Speacial Publication 800-38A," December 2001. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/legacy/sp
|
5 |
N. Falliere, "W32.Stuxnet Dossier," symantec, Feb 2011. [Online]. Available: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf.
|
6 |
M. A. Elakrat, "Development of field programmable gate array-based encryption module to mitigate man-inthe-middle attack for nuclear power plant data communication network," Nuclear Engineering and Technology, vol. Volume 50, no. Issue 5, p. 780-787, June 2018.
DOI
|
7 |
D. Brecht, "Tales from the Crypt: Hardware vs Software," Infosecurity, [Online]. Available: https://www.infosecuritymagazine.com/magazine-features/talescrypt-hardware-software/.
|
8 |
International Atomic Energy Agency, "Application of Field Programmable Gate Arrays in Instrumentation and Control Systems of Nuclear Power Plants," IAEA, p 4, 2016.
|
9 |
E. Phneah, "ZDNet," 13 Februrary 2013. [Online]. Available: https://www.zdnet.com/article/hardwarebased-security-more-effectiveagainst-new-threats/.
|
10 |
Protection of Digital Computer and Communication Systems and Networks Available, vol. 10 CFR 73.54, U.S. NRC, 2009.
|
11 |
"Cyber Security Programs for Nuclear Facilities," January 2010. [Online]. Available: http://www.nrc.gov/readingrm/doc-collections/.
|
12 |
Vitech Corporation, "COREsim User Guide," June 2015. [Online]. Available: http://www.vitechcorp.com/support/documentation/core/900/COREsimuserguide.pdf.
|
13 |
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION, "Standards for Security Categorization of Federal Information and Information Systems: FIPF PUB 199," U.S. DEPARTMENT OF COMMERCE, NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, 2004.
|
14 |
William Stallings, CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION, NY 07458: PERASON, 2011.
|