Patterned Cipher Block for Low-Latency Secure Communication
暂无分享,去创建一个
[1] Daniel J. Bernstein,et al. Introduction to post-quantum cryptography , 2009 .
[2] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[3] Jugal K. Kalita,et al. Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..
[4] Joan Daemen,et al. Cipher and hash function design strategies based on linear and differential cryptanalysis , 1995 .
[5] Chris J. Mitchell. Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity , 2005, ACISP.
[6] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[7] Jerome A. Solinas,et al. AES Galois Counter Mode for the Secure Shell Transport Layer Protocol , 2009, RFC.
[8] Kuo Tsang Huang. A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers , 2013 .
[9] Alex Biryukov,et al. Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds , 2010, IACR Cryptol. ePrint Arch..
[10] Walid Abdallah,et al. Adaptive QoS and Security for Video Transmission over Wireless Networks: A Cognitive-Based Approach , 2014, ICA3PP.
[11] Man Young Rhee. Cryptography and Secure Communications , 1993 .
[12] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[13] D. McGrew,et al. The Galois/Counter Mode of Operation (GCM) , 2005 .
[14] Jerome A. Solinas,et al. Suite B Cryptographic Suites for IPsec , 2007, RFC.
[15] Vincent Rijmen,et al. Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds , 1993, CRYPTO.
[16] Jonathan Lennox,et al. Encryption of Header Extensions in the Secure Real-time Transport Protocol (SRTP) , 2013, RFC.
[17] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[18] Rob Adams,et al. The ESP CBC-Mode Cipher Algorithms , 1998, RFC.
[19] Mark Ryan,et al. Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks , 2005, SecCo.
[20] Daniel Smith-Tone,et al. Report on Post-Quantum Cryptography , 2016 .
[21] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[22] Sasa Mrdovic,et al. Kerckhoffs' principle for intrusion detection , 2008, Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium.
[23] Ruhai Wang,et al. NIS05-1: Performance Analysis of Advanced Encryption Standard (AES) , 2006, IEEE Globecom 2006.
[24] Michal Podpora,et al. Comparison of Three CPU-Core Families for IoT Applications in Terms of Security and Performance of AES-GCM , 2020, IEEE Internet of Things Journal.
[25] Daesung Kwon,et al. New Block Cipher: ARIA , 2003, ICISC.
[26] Kjell Hausken and Gregory Levitin. Review of Systems Defense and Attack Models , 2012, International Journal of Performability Engineering.
[27] Russ Housley,et al. Suite B Profile for Transport Layer Security (TLS) , 2009, RFC.
[28] Hyangjin Lee,et al. The SEED Encryption Algorithm , 2005, RFC.