1 |
P.Kitsos, G.Kostopoulos, N. Sklavos, and O. Koufopavlou, 'Hardware Implementation of the RC4 Stream Cipher', 46th IEEE Midwest Symposium on Circuits & Systems '03, Egypt, 2003
|
2 |
Reto Zimmermann, 'Efficient VLSI Implementation of Modulo (2n 1) Addition and Multiplication, Proceedings 14th IEEE Symposium on Computer Arithmetic. pp.158-167. 1999
|
3 |
Paul D. Kundarewich, Steven J.E. Wilton, Alan J. Hu, 'A CPLD-Based RC-4 Cracking System', IEEE Proceeding of the Canadian Conference on Electrical and Computer Engineering, May 1999
|
4 |
박춘식, '유비쿼터스 네트워크와 시큐리티 고찰'. 정보보호학회지, 제14권 제 1호, pp.12-20, 2004.2
|
5 |
안하기, 신경욱, 'AES Rijndael 블록 암호 알고리듬의 효율적인 하드웨어 구현,' 정보 보호 학회 논문지, 제 12권 2호, pp.53-64, 2002. 4
|
6 |
K.T.Tsoi, K.H.Lee, and P.H.W. Leong, 'A Massively Parallel RC4 Key Search Engine', Proc. of the 10th Annual IEEE Symposium on Field- Programmable Custom Computing Machines (FCCM'02), pp.13-21, 2002
|
7 |
Panu Hamalainen. Marko Hannikainen. Timo Hamalainen, and Kukka Saarinen, 'Hardware Implementation of the Improved WEP and RC4 Encryption Algorithms for Wireless Terminals', The European Signal Processing Conference (EUSIPCO '2000), September, pp,2289-2292, 2000
|
8 |
I. Goldberg and D. Wagner. 'Architectural consideration for cryptographic hardware', http://www.cs. berkeley .edu/~iang/issac/hardware/, 1996
|
9 |
Bruce Schneir. Applied Cryptography- Protocols. Algorithms and Source Code in C. 2nd Edition. John Wiley and Sons. 1996
|
10 |
S. Fluher. I.Mantin, and A. Shamir. 'Weakness in the key scheduling algorithm of the RC4.' In Proc. 8th Workshop on Selected Area in Cryptography. LNCS 2259. Springer-Verlag. 2001
|
11 |
Confirmed Test Vector and Program for RC4, on line available at http:// www.qrst.de/html/dsds/rc4.htm. 2004
|