1 |
김창환, "유비쿼터스 환경에서의 정보보호기술", http://www.eic.re.kr, 11, 2008.
|
2 |
NIST, "AES Algorithm (Rijndael) Information", http://csrc.nist.gov/archive/aes/rijndael
|
3 |
I. Damaj, M. Itani, H. Diab, "Serpent Cryptography on Static and Dynamic Reconfigurable Hardware," aiccsa, IEEE International Conference on Computer Systems and Applications, pp. 680-684, 2006.
|
4 |
NIST, "pseudo-random number generator", http://www.itl.nist.gov/div897/sqg/dads/HT ML/pseudorandomNumberGen.html
|
5 |
Microelectronic Systems Laboratory, "Implementation of DES Algorithm Using FPGA Technology", http://www.alagger.com/des-vhd l/report.pdf, 2002.
|
6 |
"DES and 3DES cores", http://www. helion tech.com/des.htm
|
7 |
"SEED 블록암호알고리즘", http://service2.nis.go. kr/pw_certified/seed.jsp
|
8 |
"A candidate block cipher for the advanced encryption standard", http://www.cl.cam.ac.uk /-rja14/serpent.html
|