References
- Data Encryption Standard, FIPS (Federal Information Processing Standards Publication) 46-3, National Institute of Standard & Technology (NIST), 1999.
- Announcing the Advanced Encryption Standard (AES), FIPS (Federal Information Processing Standards Publication) 197, National Institute of Standard & Technology (NIST), 2001.
- Morris Dworkin (Editor), Recommendation for Block Cipher Modes of Operation - Methods and Techniques, Special Publication 800-38A, National Institute of Standard & Technology (NIST), 2001.
- P. J. Lee, "ISO/IEC JTC1/SC27 International Standard 8372 - Information Processing - Modes of operation for a 64-bit block cipher algorithm," J. Korea Inst. Inf. Security & Cryptology, vol. 4, no. 1, Mar. 1994.
- H. J. Kim and Y. J. Jeong, "Design of I/O module for pipelining crypto processors," in Proc. KICS, pp. 1926-1929, Korea, Jul. 2002.
- S. K. Yang, G. H. Kim, C. S. Park, and G. Y. Cho, "Study for block cipher operating Mode using counter," in Proc. KIICE, Daejoen, Korea, Oct. 2008.
- Y. Huang, F. Leu, J. Liu, J. Yang, C. Yu, C. Chu, and C. Yang, "Building a block cipher mode of operation with feedback keys," in Proc. IEEE ISIE, Taipei, Taiwan, May 2013.
- Y. Kim, An efficient mode of operation for block ciphers and a remote audit system using the mode, Ph.D Dissertation, Seoul National University, 2000.
- Y. Kim and Y. Cho, "The random block feedback mode for block ciphers," IEICE Trans. Fundamentals, vol. E00-A, no. 6, Jun. 2000.
- Y. Kim, J. Yoon, J.-H. Joo, and K. Yi, "Robust lightweight fingerprint encryption using random block feedback," IET Electronics Lett., vol 50, Issue 4, Feb. 2014.
- Y. Kim, J. Yoon, and K. Yi, "Random block feedback mode for AES: A more secure mode of operation with small overhead," submitted, 2014.
- D. Stinson, Cryptography: Theory and Practice, Florida: CRC Press, 2006.
- A. Menezes, P. Oorschot, and S. Vanstone, Handbook of Applied Crytography, Florida: CRC Press, 1996.
- E. Biham and P. C. Kocher, "A known plaintext attack on the PKZIP stream cipher," Fast Software Encryption, Lecture Notes in Comput. Sci., vol. 1008, pp. 144-153, 1995.
- J. Lu, O. Dunkelman, N. Keller, and J. Kim, "New impossible differential attacks on AES," INDOCRYPT 2008, LNCS, vol. 5365, pp. 279-293, 2008.