|
[1] William Stallings, Cryptography and Network Security: Principles and Practices Third Edition, Prentice Hall International, Inc, August 27, 2002. [2] AES home page, URL: http://www.nist.gov.aes/. [3] Joan Daemen and Vincent Rijnmen, AES Proposal: Rijndael, AES Algorithm Submission, September 3, 1999, available at [2]. [4] The Rijndael Page, URL: http://www.esat.kuleuven.ac.be/~rijmen/rijndael/. [5] S.F. Hsiao, M.C. Chen and C. S. Tu, “Memory-Free Low-Cost Designs of Advanced Encryption Standard Using Common Subexpression Elimination for Subfunctions in Transformations.” IEEE Circuit Syst. Mag., Vol. 53, No. 3, March 27 2006, PP. 615-626. [6] National Institute of Standards and Technology, Advanced Encryption Standard (AES), Federal Information Processing Standard (FIPS) Publication 197, November 26 2001, PP. 1-3. [7] H. Brunner, A Curiger, and M. Hofstetter, “On computing multiplicative inverses in GF(2m).” IEEE Transactions on Computers, Vol. 42, No.8, August 25 1993, PP. 1010-1015. [8] Y. T. Horng and S. W. Wei, “Fast Inverters and Dividers for Finite Field GF(2m).” Asia-Pacific Conference on Circuits and Systems, December 5 1994, PP. 206-211. [9] C. C. Wang, T. K. Truong, H. M. Shao, L. J. Deutsh, J. K. Omura, and I. I. Reed, “VLSI architectures for computing multiplications and inverters in GF(2m).” IEEE Transactions on Computers, Vol. C-34, August 21 1985, PP. 709-717. [10] M. Y. Wang, C. P. Horng, C. W. Wu and C. T. Huang “Single- and Multi-core Configurable AES Architectures for Flexible Security.” IEEE Trans. on VLSI Systems, Vol. 17, Issue 12, July 21 2009, PP. 546-547.
|