1 |
L. of the IEEE CS, "Wireless LAN medium access control(MAC) and physical layer (PHY) specifications," Technical Report, IEEE Standard 802.11, 1999.
|
2 |
http://www.ecrypt.eu.org/
|
3 |
박창수, 조경연, "갈로이 선형 궤환 레지스터의 일반화.", 전자 공학회 논문지 제43권 C1편 제1호 2006.
|
4 |
M. Walker and T. Wright, "GSM and UMTS: The creation of global mobile communication," John Wiley & Sons, pp.385-406, 2002.
|
5 |
B. Schneier, "Appled cryptography: Protocols, algorithms and source code in C," John Wiley & Sons, 1996.
|
6 |
FIPS PUB 197, Advanced Encryption Standard (AES), NIST, 2001.
|
7 |
D. J. Bernstein and P. Schwabe, "New AES Software Speed Records," INDOCRYPT 2008, LNCS Vol.5365, pp.322-336, 2008.
|
8 |
S. Contini, R. L. Rivest, M. J. B. Robshaw, and Y. L. Yin, "The Security of the RC6 Block Cipher," 1998.
|
9 |
C. Carroll, A. Chan, and M. Zhang "The software-oriented stream cipher SSC-II," FSE 2000, LNCS Vol.1978 pp.39-56 2000.
|
10 |
이준석, 장화식, 이경현, "셀룰러오토마타를 이용한 스트림 암호," 한국멀티미디어 학회 논문지, v.5, no.2, 2002.
|
11 |
A. Biryukov, A. Shamir and D. Wagner, "Real time cryptanalysis of A5/1 on a PC," Proceedings of Fast Software Encryption-FES, 2000.
|
12 |
D. J. Bernstein, Synchronous Stream Cipher Salsa20, http://www.ecrypt.eu.org/stream/ salsa20.html
|
13 |
김길호, 박창수, 김종남, 조경연, "소프트웨어 구현에 적합한 고속 스트림 암호 AA32", 한국통신학회논문지, 제35권 제6호, 2010. 6, pp.954-961
|
14 |
Y.L. Yin, "A Note on the Block Cipher Camellia," a contribution for ISO/IEC JTC1/ SC27, 2000.
|
15 |
ETSI. 3GPP TS 35.201. Specification of the 3GPP Confidentiality and Integrity Algorithms: Document 1: f8 and f9 Specification, 2002.
|
16 |
Bluetooth SIG. Specification of the Bluetooth System 2.0. http://www.bluetooth.com, 2005.
|
17 |
P. Hawkes, F. Quick and G. Roes, "A practical cryptanalysis of SSC2," Selected Areas in Cryptography LNCS, Vol.2259 pp.27-37, 2001.
|
18 |
P. Souradyuti and B. Preneel, "Analysis of Non-fortuitous RC4 key stream generator," Progress in Crytology-INDOCRYPT, 2003.
|