1 |
Daemon, J., and Rijmen, V., "Rijndael: The Advanced Encryption Standard," Dr Dobb's Journal, Mar., 2001.
|
2 |
Daemen, J., and Rijmen, V. "The Design of Rijndael: The Wide Trail Strategy Explained," NewYork, Springer-Verlag, 2002.
|
3 |
Forouzan, B., "Security for Computer Networking," John Willy & sons, pp. 93-95, 1989.
|
4 |
Bright, H. S.and Enison, R. L., "Cryptography Using Modular Software Elements," Proc. NCC, Vol. 45, AFIPS Press, Montvale, N. J., pp. 113-123, 1976. https://doi.org/10.1145/1499799.1499816
DOI
|
5 |
Forouzan, B., "Data Communications and Networking," Mc Graw Hill, pp. 397-398, 2007.
|
6 |
Davies, D. W., Price W.L. "Security for Computer Network", John Wiley & Sons, pp. 93-94, 1989.
|
7 |
E. Biham, "New types of cryptanalytic attacks using related keys," Advances in Cryptology, Proceedings Eurocrypt'93, NCS 765, T. Helleseth, Ed., Springer-Verlag, pp. 398-409, 1994. https://link.springer.com/content/pdf/10.1007%2F3-540-48285-7_34.pdf
|
8 |
William Stallings, "Cryptography and Network Security," Pearson Education Inc., pp.187-189, 2013.
|
9 |
IEEE Std. 802.3, "Part3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical layer Specification," 2008.
|
10 |
William Stallings, "Cryptography and Network Security", Pearson Education Inc., pp.185-192, 2013.
|
11 |
ISO 9160, "Information processing -Data encipherment -Physical layer interoperability requirement," International Standards Organization, 1988. https://www.iso.org/obp/ui/fr/#iso:std:iso:9160:ed-1:v1:en
|
12 |
William Stallings, "Cryptography and Network Security", Pearson Education Inc., pp.63, 2013.
|
13 |
Lee Kun-bae, Lee Byung-wook, "Hardware implementation of 128-bit encryption algorithm using FPGA," Journal of the Information Processing Society, Vol. C, 8-C (No. 3), pp.277-286 Jun. 2001. https://www.koreascience.or.kr/article/JAKO200111920780446.page
|
14 |
Im Sung-Yeal, Chung Ki-Dong, "ATM Cell Encryption Method using Rijndael Algorithm in Physical Layer," JIPS, VOL. 13-C, pp 84, Feb., 2006. https://doi.org/10.3745/KIPSTC.2006.13C.1.083
DOI
|
15 |
Forouzan, B., Data Communications and Networking,Mc Graw Hill, pp. 397-398, 2007.
|
16 |
Denning, D. E., "Cryptography and Data Security", Addison-Wesley Publishing Co., pp. 135-138, 1983.
|
17 |
Branstad, D. K., "Security of Computer Communication," IEEE, Comm. Soc. Mag. Vol. 16, No 6, pp. 33-40, Nov. 1978.
|
18 |
Denning, D. E., "Cryptography and Data Security", Addison-Wesley Publishing Co., pp. 138-139, 1983.
|
19 |
S. W., "Shift Register sequences," Holden-Day, San Fransico, Calif., 1967.
|
20 |
Forouzan, B., Data Communications and Networking,Mc Graw Hill, pp. 1006-1008, 2007.
|
21 |
NIST, "Announcing the Advanced Encryption Standard(AES)," FIPS PUB-197, Nov., 2001.
|