Architecture for the Secret-Key BC3 Cryptography Algorithm
暂无分享,去创建一个
Yusuf Kurniawan | Hidayat Hidayat | Sarwono Sutikno | Arif Sasongko | S. Sutikno | Hidayati Hidayat | A. Sasongko | Yusuf Kurniawan
[1] Guido Bertoni,et al. Efficient Software Implementation of AES on 32-Bit Platforms , 2002, CHES.
[2] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[3] Mitsuru Matsui,et al. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis , 2000, Selected Areas in Cryptography.
[4] Akashi Satoh,et al. A Compact Rijndael Hardware Architecture with S-Box Optimization , 2001, ASIACRYPT.
[5] Alex Biryukov,et al. Distinguisher and Related-Key Attack on the Full AES-256 , 2009, CRYPTO.
[6] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[7] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[8] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[9] Iping Supriana,et al. The New Block Cipher: BC2 , 2009, Int. J. Netw. Secur..
[10] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.