1 |
Denning, D. E., "Cryptography and Data Security," Addison-Wesley Publishing Co., pp. 138-139, 1983
|
2 |
Daemen, J., and Rijmen, V. "AES Proposal: Rijndael, Version 2," Submission to NIST, March 1999
|
3 |
Sin Hyeo-Bin, Yoo Hwang=Bin, "A Study on the Structure and Cryptographic Algorithm for Secrets in ATM-type High-Speed Communication Networks," JKICS, Vol 23, No. 1, May 1998
|
4 |
Im Sung-Yeal, Chung Ki-Dong,"ATM cell Encryption Method using Rijndael Algorithm in Physical Layer," KIPS, Vol 13-c, No.1, Feb., 2006
|
5 |
E. Biham, "New types of cryptanalytic attacks using related keys," Advances in Cryptology, Proceedings Eurocrypt'93, NCS 765, T. Helleseth, Ed., Springer-Verlag, pp. 398-409, 1993
|
6 |
NIST, "Announcing the Advanced Encryption Standard (AES)," FIPS PUB 197, 2001
|
7 |
Electronic Frontier Foundation," Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design," Sebastopol, CA: O'Reilly, 1998
|
8 |
Forouzan, B., "Security for Computer Networking," John Willy & sons, pp. 231-234, 2008
|
9 |
Rainer Handel, Manfred N.Huber and Stefan Schroder, "ATM Networks: Concepts, Protocols, Applications," Addison-Wesley Publishing Co., pp. 88-95, 1994
|
10 |
Handel,R."Operation and Maintenance Issues of ATM Networks," Proc. of the International Conference on Communication Technology, Beijing, 1992, Vol.1, pp1107~1117, 1992
|
11 |
Rainer Handel, Manfred N.Huber and Stefan Schroder, "ATM Networks: Concepts, Protocols, Applications," Addison-Wesley Publishing Co., pp. 88-95, 1994
|
12 |
ISO 9160 "Information processing-Data encipherment-Physical layer interoperability requirement," International Standards Organization, 1988
|
13 |
Rathgeb, E.P., Theimer, T.H., Huber, M.N. "ATM Switches - Basic Architectures and their Performance," International Journal of Digital and Analog Cabled System 3, vol.2, no.4, pp.227-236, Oct. 1989
DOI
|
14 |
ITU-T:recommendation I.432. 'B-ISDN User-Network Interface-Physical Layer Specification,' Rev. 1, Geneva, 1993
|
15 |
Suh Jeong-Wook, Kim Kyeong-Soo, "Information protection at ATM physical layer," JKIISC, Vol 7, No 1, Mar. 1997
|
16 |
Forouzan, B., "Security for Computer Networking," John Willy & sons, pp. 236-237, 2008
|
17 |
Newman, P.,"ATM Technology for Corporate Networks," IEEE Communications Magine, Vol.30, No.4, pp.90~101, Apr.,1992
DOI
|
18 |
Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard," Dr. Dobb's Journal, March 2001
|
19 |
Rathgeb, E.P., Theimer, T.H., Huber, M.N."ATM Switches - Basic Architectures and their Performance," International Journal of Digital and Analog Cabled System 3, vol.2, no.4, pp.227-236, October 1989
DOI
|
20 |
William Stallings, "Cryptography and Network Security:Principles and Practice," Pearson Education Inc., pp.187-189, 2014
|
21 |
Forouzan, B., "Security for Computer Networking," John Willy & sons, pp. 236-238, 2008
|
22 |
Forouzan, B., "Security for Computer Networking," John Willy & sons, pp. 236-237, 2008
|