References
- C. H. Bennett and G. Brassard, In proceedings of IEEE INternational Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), p.75.
- L. R. Knudsen, "Block Ciphers-Analysis, Dsign and Applications," Ph.D Thesis, Computer Science department, Aarhus University, 1994.
- P. Dusart, G. Letourneux, and O. Vivolo, "Differential Fault Analysis on A.E.S", http://eprint.iacr.org/2003/ 010.pdf
- NIST, "Federal Information Processing standards Publication 197-Specification for the Advanced Encryption Standard (AES)"
- http://csrc.nist.gov/publications/fips/fips-197.pdf, 2001 level Parallelism in AES Candidates.
- NIST, "Data Encryption Standard(DES)", http://www.itl.nist.gov/fipspubs/fip46-2.htm
- B. Schneier, Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth), 1996.
- A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
- N.Goots, B. Izotov, A. Moldovyan, N. Moldovyan, Modern Cryptography: Protect Your Data with Fast Block Ciphers, A-LIST Publishing, 2003.
- D. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.
- Charles H. Bennett, Gilles Brassard, Artur K. krt, Quantum Cryptography, Scientific American, October 1992.
Cited by
- 스마트 전자정부 구현을 위한 보안 알고리즘 응용 제안 vol.18, pp.1, 2013, https://doi.org/10.6109/jkiice.2014.18.1.11
- 시간지연을 이용한 양자비밀직접통신 vol.21, pp.12, 2013, https://doi.org/10.6109/jkiice.2017.21.12.2318