1 |
National Institute of Standard and Technology(NIST), "FIPS 140-3 Standards," 2019
|
2 |
Korea Standards Association, "KS X ISO/IEC 19790," Information technology-Security techniques-Security requirements for cryptographic modules, 2015
|
3 |
Korea Standards Association, "KS X ISO/IEC 24759," Information technology - Security techniques - Test requirements for cryptographic modules, 2015
|
4 |
Korea Internet & Security Agency (KISA), "https://seed.kisa.or.kr/kisa/kcmvp/Egosummary.do"
|
5 |
National Intelligence Service(NIS), "http://www.nis.go.kr/AF/1_7_3_1.do"
|
6 |
Nvidia, CUDA Toolkit, Nvidia Developer, "https://developer.nvicia.com/cuda-toolkit"
|
7 |
Nvidia, CUDA Toolkit Documentation, Nvidia Developer, "https://docs.nvidia.com/cuda/index.html"
|
8 |
Deuk-jo Hong, Jung-Keun Lee, Dong-Chan Kim, Dae-Sung Kwon, Kwon-Ho Ryu, and Dong-Geon Lee, "LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors," International Workshop on Information Security Applications (WISA), pp. 3-27, 2013
|
9 |
National Institute of Standard and Technology(NIST), "FIPS 180-4 Standards," 2015
|
10 |
National Institute of Standard and Technology(NIST), "FIPS 198-1 Standards," 2008
|
11 |
National Institute of Standard and Technology(NIST), "NIST SP 800-90A Determinstic Random Bit Generator Validation System", 2015
|
12 |
National Institute of Standard and Technology(NIST), "NIST SP 800-78-4 Cryptographic Algorithms and Key Sizes for Personal Identity Verification," 2015
|