On the parameterized IP core design of the new cryptographic system
暂无分享,去创建一个
[1] Walter Anheier,et al. Reusable cryptographic VLSI core based on the SAFER K-128 algorithm with 251.8 Mbit/s throughput , 1998, 1998 IEEE Workshop on Signal Processing Systems. SIPS 98. Design and Implementation (Cat. No.98TH8374).
[2] Michael Keating,et al. Reuse Methodology Manual , 1999 .
[3] Yukio Mitsuyama,et al. VLSI implementation of high performance burst mode for 128-bit block ciphers , 2001, Proceedings 14th Annual IEEE International ASIC/SOC Conference (IEEE Cat. No.01TH8558).
[4] Jiun-In Guo,et al. New voice over Internet protocol technique with hierarchical data security protection , 2002 .
[5] Ralph Howard,et al. Data encryption standard , 1987 .
[6] C. Wu,et al. Studying chaos via 1-D maps-a tutorial , 1993 .
[7] L. Chua,et al. Chaos: A tutorial for engineers , 1987, Proceedings of the IEEE.
[8] Xun Yi,et al. Fast encryption for multimedia , 2001, IEEE Trans. Consumer Electron..
[9] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[10] Wolfgang Fichtner,et al. VINCI: VLSI implementation of the new secret-key block cipher IDEA , 1993, Proceedings of IEEE Custom Integrated Circuits Conference - CICC '93.
[11] Shau-Yin Tseng,et al. Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.