1 |
C. Maple, "Security and Privacy in the Internet of Things," Journal of Cyber Policy, vol. 2, no. 2, pp. 155-184, 2017. DOI:10.1080/23738871.2017.1366536
DOI
|
2 |
Advanced Encryption Standard, NIST Standard FIPS 197, 2001.
|
3 |
128 bit Block Encryption Algorithm ARIA, KS X 1213:2004, 2004.
|
4 |
Digital Signature Standard (DSS), NIST Standard FIPS PUB 186-4, 2013.DOI:10.6028/NIST.FIPS.186-4
DOI
|
5 |
Secure hash standard (SHS), NIST Standard FIPS PUB 180-4, 2012. DOI:10.6028/NIST.FIPS.180-4
|
6 |
Morris Dworkin,"Recommendation for Block Cipher Modes of Operation-Methods and Techniques,"NIST Special Publication 800-38A, Dec, 2001. DOI:SP 800-38A
|
7 |
D. McGrew and J. Viega, "The Galois/Counter Mode of Operation (GCM )," Submission to NIST Modes of Operation Process, 2004.
|
8 |
IEEE Standard for Local and Metropolitan Area Networks, Media Access Control (MAC) Security, 2006. DOI:10.1109/IEEESTD.2006.245590
DOI
|
9 |
Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands, IEEE Standard 802.22-2011, pp. 1-672, 2011.
|
10 |
V. P. Hoang, V. T. Nguyen, A. T. Nguyen, C. K. Pham, "A low power AES-GCM authenticated encryption core in 65nm SOTB CMOS process," Proceedings of 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 112-115, Boston, 2017. DOI:10.1109/MWSCAS.2017.805287
|
11 |
J. Vliegen, O. Reparaz, and N. Mentens "Maximizing the Throughput of Threshold-protected AES-GCM Implementations on FPGA," Proceedings of 2017 IEEE 2nd International Verification and Security Workshop (IVSW), pp. 140-145, Thessaloniki, Greece, 2017. DOI:10.1109/IVSW.2017.8031559
|
12 |
K.M. Abdellatif, R. Chotin-Avot, and H. Mehrez, "Improved Method for Parallel AES-GCM Cores Using FPGAs," Proceedings of 2013 International Conference on Reconfigurable Computing and FP GAs (ReConFig), Cancun, 2013. DOI:10.1109/ReConFig.2013.6732299
|
13 |
128-Bit Block Cipher LEA, TTA Standard TTAK.KO-12.0223, 2013.
|
14 |
K.B. Kim, B.Y. Sung and K.W. Shin "An Implementation of GCM Authenticated Encryption based on ARIA Block Cipher," in Proceeding of conference on korea information and communication engineering, Pusan, pp.111, 2017.
|
15 |
B.S Koo, G.H. Ryu, T.J. Chang, and S. Lee, "Design of an Efficient AES-ARIA Processor using Resource Sharing Technique," Journal of The Korea Institute of Information Security and Cryptology, vol. 18, no. 6A, pp. 39-49, 2008.
|
16 |
K.B. Kim and K.W. Shin, "A Unified ARIA-AES Cryptographic Processor Supporting Four Modes of Operation and 128/256-bit Key Lengths," Journal of the Korea Institute of Information and Communication Engineering, Vol. 21, No. 4, pp. 795-803, 2017. DOI:10.6109/jkiice.2017.21.4.795
DOI
|