Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations
暂无分享,去创建一个
[1] BLOCK CIPHER MODES OF OPERATION , 2015 .
[2] Ayushi. A Symmetric Key Cryptographic Algorithm , 2010 .
[3] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[4] W. Campbell,et al. THE UNIVERSITY OF TEXAS AT DALLAS , 2004 .
[5] Sang Hyuk Son,et al. The price of security in wireless sensor networks , 2010, Comput. Networks.
[6] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[7] Chi-Wu Huang,et al. The Platform Built Based on the Mode operations of AES and the Image Applications , 2011 .
[8] Saudi Arabia,et al. A Novel Security Model Combining Cryptography and Steganography , 2004 .
[9] John Viega,et al. The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.
[10] Veno Jovan Pachovski,et al. MODES OF OPERATION OF THE AES ALGORITHM , 2014 .
[11] Helger Lipmaa,et al. Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption , 2000 .
[12] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[13] Jehn-Ruey Jiang,et al. Pricing Resources in LTE Networks through Multiobjective Optimization , 2014, TheScientificWorldJournal.
[14] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[15] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[16] Helger Lipmaa,et al. IDEA: A Cipher For Multimedia Architectures? , 1998, Selected Areas in Cryptography.
[17] Sonia Goyat. GENETIC KEY GENERATION FOR PUBLIC KEY CRYPTOGRAPHY , 2012 .
[18] Chris J. Mitchell,et al. International standards for stream ciphers : A progress report , 2004 .
[19] Budi Arief,et al. Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1--Attackers , 2015, IEEE Security & Privacy.
[20] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[21] Stefan Tillich,et al. Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes , 2009, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing.
[22] Stelvio Cimato,et al. Encyclopedia of Cryptography and Security , 2005 .
[23] Vashitva Kumar Srivastava,et al. A Symmetric Key Cryptographic Algorithm , 2012 .
[24] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .