1 |
I. Damaj, M. Itani, H. Diab, "Serpent Cryptography on Static and Dynamic Reconfigurable Hardware," aiccsa, pp.680-684, IEEE International Conference on Computer Systems and Applications, 2006. DOI: http://dx.doi.org/10.1109/AICCSA.2006.205163
|
2 |
NIST, "pseudo-random number generator", http://www.itl.nist.gov/div897/sqg/dads/HTML/pseudorandomNumberGen.html
|
3 |
Microelectronic Systems Laboratory, "Implementation of DES Algorithm Using FPGA Technology", http://www.alagger.com/des-vhdl/report.pdf, 2002.
|
4 |
"DES and 3DES cores", http://www.heliontech.com/des.htm
|
5 |
"SEED block cryptographic algorithm", http://service2.nis.go.kr/pw_certified/seed.jsp
|
6 |
"A candidate block cipher for the advanced encryption standard", http://www.cl.cam.ac.uk/-rja14/serpent.html
|
7 |
"information protection in ubiquitous environments", http://www.eic.re.kr, 2008. 11.
|
8 |
N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, and D. Whiting, "Improved Cryptanalysis of Rijndael", Seventh Fast Software Encryption Workshop, Springer-Verlag, 2000.
|
9 |
NIST, "AES Algorithm (Rijndael) Information", http://csrc.nist.gov/archive/aes/rijndael
|