1 |
Martin P.J. and Kratz, Information systems security, Van Nostrand Reinhold, 1993
|
2 |
Telecommunication Technology Associate, 128-bits Block Encryption Algorithm (SEED), Jun. 1999.
|
3 |
http://www.nsri.re.kr/ARIA, National Security Research Institute ,ARIA Algorithm Specification
|
4 |
D.H. Youn, Modrn CRYTOGRAPHY, Green, 2004.
|
5 |
H.R.Yoo, B.S.Chea, K.Y. Kim, Y.B.Cho, "Hardware Design and Implementation for SEED Cipher Processor of Dynamic Scheduling Architecture," IDEC(IC Design Education Center , 2003.
|
6 |
C.E.Shanon. Communication Theory of Secrecy System. Bell System Technical Journal , vol.30, pp.50-64, 1951.
DOI
|
7 |
KESHAB K. PARHI, VLSI Digital Signal Processing, JOHN WILEY & SONS,INC, 1999.
|
8 |
Y.C. Kim, Y.M. Jung, J.H.Cho, Y.S. Hong Reunong, VHDL for digital design , Hg Science Publisher, 2001
|
9 |
J.S. Park, Y.S Yun, Y.D Kim, "Design and Implementation of ARIA Cryptic Algorithm," The Institute of Electronics Engineers of Korea., vo. 42, no. 4, pp 29-36, 2005.
|
10 |
K.B.Kim, K.W.Shin, "A Unified ARIA-AES Cryptographic Processor Supporting Four Modes of Operation and 128/256-bit Key Lengths, " Journal of the Korea Institute of Information and Comm., vol. 21, no. 4, pp 795-803, 2017. DOI:10.6109/jkiice.2017.21.4.795
|