References
- H. No and T. S. Sohn, "NCW," J. KIDA, vol. 5, no. 19, pp. 1046(05-19), May. 2005.
- I. S. Choi, "Defense information security in NCW environments," J. Korean Inst. Inform. Sci. Eng. (KIISE), vol. 25, no. 9, pp. 81-88, Aug. 2007.
- NIST, "Advanced Encryption Standard(AES)," FIPS PUB 197, Nov. 2001.
- C. S. Park and G. Y. Cho, "Generalization of Galois linear feedback register," J. Inst. Electron. Eng. Korea (IEEK), vol. 43C1, no. 1, pp. 1-8, Jan. 2006.
- NIST, Papers Submitted to AES3, retrieved Aug, 10, 2013, from http://csrc.nist.gov/archive/aes/round2/conf3/aes3papers.html
- National Bureau of Standards, "Data Encryption Standard," FIPS PUB 46, Jan. 1977.
- A. Rudra, P. K. Dubey, C. S. Jutla, V. Kumar, J. R. Rao, and P. Rohatgi, "Efficient Rijndael encryption implementation with composite field arithmetic," Lecture Notes Comput. Sci., vol. 2162, pp. 171-184, May 2001.
- A. Satoh, S. Morioka, K. Takano, and S. Munetoh, "A compact Rijndael hardware architecture with S-Box optimization," Lecture Notes Comput. Sci., vol. 2248, pp. 239-254, Dec. 2001.
- S. Morioka and A. Satoh, "An optimized S-Box circuit architecture for low power AES design," Lecture Notes Comput. Sci., vol. 2523, pp. 172-186, Aug. 2003.
- J. M. Grando-Criado, M. A. Vega-Roriguez, J. M. Sanchez-Perez, and J. A. Gomez-Pulido, "A new methodology to implement the AES algorithm using partial and dynamic reconfiguration," Integration, the VLSI J., vol. 43, no. 1, pp. 72-80, Jan. 2010. https://doi.org/10.1016/j.vlsi.2009.05.003
- H. K. Baek, J. S. Lim, and S. M. Jeong, "Technology trend of tactical data link for NCW," The Journal of The Korea Institute of Communication Sciences, vol. 28, no. 7, pp. 59-69, Sep. 2010.
- G. Saggese, A. Mazzeo, N. Mazzocca, and A. Strollo, "An FPGA-based performance analysis of the unrolling, tiling, and pipelining of the AES algorithm," Lecture Notes Comput. Sci., vol. 2778, pp. 292-302, Sep. 2003.
- P. Hawkes and G. Rose, "Guess-and-determine attacks on SNOW," Lecture Notes Comput. Sci., vol. 2595, pp. 37-46, Aug. 2002.
- J. Daemen and V. Rijmen, "The Design of Rijndael," Springer-Verlag, Sep. 2002.
- J. Cheon, M. Kim, K. Kim, J. Lee, and S. Kang, "Improved impossible differential cryptanalysis of Rijndael and crypton," Lecture Notes Comput. Sci., vol. 2288, pp. 39-49, Dec. 2001.
- A. Birynkov, "The boomerang attack on 5 and 6-round reduced AES," Lecture Notes Comput. Sci., vol. 3373, pp. 42-57, May. 2004.
- S. Hong, S. Lee, J. Lim, J. Sung, D. Cheon, and I. Cho, "Provable security against differential and linear cryptanalysis for the SPN structure," Lecture Notes Comput. Sci., vol. 1978, pp. 273-283, Apr. 2001.