1 |
Ronnie Swanink, Persistent Effects of Man-in-the-middle Attacks, Bachelor thesis, Computer Science, Radboud University, January 10th, 2016.
|
2 |
William Stallings, Cryptography and Network Security Principal and Practice, fifth ed., Prentice Hall, 2011.
|
3 |
TCG, Specifications Architecture Overview, August 2007 version 1.4.
|
4 |
B. Badrignans, F. Devic, L. Torres, G. Sassatelli, P. Benoit, Embedded systems security for FPGA, Springer link book, 2011, pp. 189-190.
|
5 |
C. Paar, J. Pelzl, Understanding Cryptography Textbook, Springer, 2010.
|
6 |
IEC 62566, Nuclear power plants e Instrumentation and control important to safety e development of HDL-programmed integrated circuits for systems performing category a functions, Edition 1.0 2012-01.
|
7 |
SAFETY STANDARDS SERIES SSG-39, Design of Instrumentation and Control Systems for Nuclear Power Plants, IAEA, Vienna, 2016.
|
8 |
J. Ranta, The current state of FPGA technology in the nuclear domain vol. 10, VTT TECHNOLOGY, 2012.
|
9 |
U.S.NRC 10 CFR 73.54, Protection of Digital Computer and Communication Systems and Networks [Last update: 2015, December 2], Available from: http://www.nrc.gov/.
|
10 |
U.S.NRC, Regulatory Guide 5.71, Cybersecurity Programs for Nuclear Facilities, January 2010. Available from: http://www.nrc.gov/.
|
11 |
Cybersecurity Framework, National Institute of Standards and Technology, February 2014. https://www.nist.gov/cyberframework.
|
12 |
Guide for Applying the Risk Management Framework to Federal Information Systems: A security life cycle approach, National Institute of standards and technology NIST, Special Publication, October 2016, pp. 800-837. Revision 1.
|
13 |
Recommendation for Key Management,- NIST Special Publication 800-57 Part 1, Revision 3, July 2012, https://doi.org/10.6028/NIST.SP.800-57p1r3.
DOI
|
14 |
U.S.NRC, NUREG/CR-7006, Review Guidelines for field-programmable gate arrays in nuclear power plant safety systems, 2009.
|
15 |
Nexys FPGA Board Reference Manual, Digilentinc, May 2017, https://reference.digilentinc.com/reference/...logic/nexys-video.
|
16 |
Vitech COREsim User Guide, CORE 9 Version. [Cited 2016 August 16] Available from: http://www.vitechcorp.com/.
|
17 |
Vivado Design Suite Tutorial Using Constraints UG945 (v2015.2), June 24, 2015. https://www.xilinx.com/.
|
18 |
Block Cipher Modes of Operation, National Institute of Standards and Technology NIST, October 2010.
|
19 |
IEEE Standard for Criteria for Digital Computer in Safety System of Nuclear Power Generating Stations, IEEE Std 7-4.3.2TM, 2010.
|
20 |
Hu, T. and Desai, J.P. (2004) Soft-Tissue Material properties under large Deformation: Strain rate effect. Proceedings of the 26th Annual International Conference of the IEEE EMBS, San Francisco, 1-5 September 2004, 2758-2761.
|
21 |
Y. Aruna, FPGA based implementation of AES encryption and decryption with verilog HDL, in: International Conference on Industrial Automation and Computing, ICIAC, April 2014.
|
22 |
IEC, Nuclear power plants e Instrumentation and control important to safety - development of HDL-programmed integrated circuits for systems performing category A.
|
23 |
Cybersecurity Plan for Nuclear Power Reactors, NEI 08-09 [Rev. 6], April 2010.
|