[1] FIPS Publication 197, Advanced Encryption Standard (AES). U.S. DoC/NIST, November 2001.
[2] J. Ji, S. Jung, E. Jun, and J. Lim, “Efficient Sequential Architecture for the AES CCM Mode in the 802.16e Standard,” in Proceedings of the Second International Conference on Intelligent Networks and Intelligent Systems, pp. 253--256, China, November 2009.
[3] X. Jinwei, and R. Shijin, “Designing and Realization for AES-CCM Encryption
Protocol in WiMAX,” in Proceedings of the Conference on Communication Faculty, pp. 304--309, China, 2009.
[4] D.H. Bae, “An Efficient Design of CCMP for Robust Security Network,” LNCS 3935, Information Security and Cryptology ICISC, pp. 352--361, 2006.
[5] A. Aziz and N. Ikram, “An FPGA-based AES-CCM Crypto Core for IEEE 802.11i Architecture,” International Journal of Networks Security, vol. 5, no. 2, pp. 224--232, Pakistan, September 2007.
[6] T. Phan, V. Hoang and V. Dao, “An Efficient FPGA Implementation of AES-CCM Authenticated Encryption IP Core,” in Proceedings of the IEEE 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS), pp. 202--205, Danang, Vietnam, September 2016.
[7] K. Nguyen, L. Lanante, Y. Nagao, M. Kurosaki and H. Ochi, “Implementation of 2.6 Gbps Superhigh Speed AES-CCM Security Protocol for IEEE 802.11i,” in Proceedings of the IEEE International Symposium on Communications and Information Technologies (ISCIT), pp. 669--673, Surat Thani, Thailand, September 2013.
[8] NIST Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality (CCM), U.S., May 2004.
[9] William Stallings, Cryptography and Network Security Principles and Practice, Seventh edition, Pearson, October 2016.
[10] Y. Huang, Y. Lin, K. Hung and K. Lin, “Efficient Implementation of AES IP,” in Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, pp. 1418--1421, Singapore, 2006.
[11] M. Curtin and J. Dolske, “A Brute Force Search of DES Keyspace,” draft, pp.1--13, September 1997.
[12] K. Gaj and P. Chodowiec, “Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware,” in Proceedings of The Third Advanced Encryption Standard (AES3) Candidate Conference, pp. 1--15, New York, USA, April 2000.
[13] E. NC Mui, “Practical Implementation of Rijndael S-Box Using Combinational Logic,” unpublished draft.
[14] A. Chakib, “New Experimental results for AES-CCMP acceleration on Cyclone-П FPGA,” International Journal of Computer Science and Network Security, vol. 10, no. 4, pp. 1--6, KSA, April 2010.
[15] L.T. Emmanuel, R.H. Francisco, and D.P. Arturo, “An FPGA Implementation of CCM Mode Using AES,” LNCS 3935, Information Security and Cryptology ICISC, pp.322--334, 2006.
[16] D. V. Lan, N. A. Thai, H. V. Phuc, “A Low Area, Low Power 8-bit AES-CCM Authenticated Encryption Core in 180nm CMOS Process,” VNU Journal of Science: Comp. Science & Com. Eng, vol. 34, no. 1, pp. 30--37, Hanoi, Vietnam, 2018.
[17] Y. Mitsuyama, M. Kimura, T. Onoye, and I. Shirakawa, “Embedded Architecture of IEEE802.11i Cipher Algorithms,” in Proceedings of the 2004 IEEE International Symposium on Consumer Electronics, pp. 241--246, UK, 2004.
[18] M. Ossmann, “WEP: Dead Again, Part 1,” 2004.
https://web.archive.org/web/20060408114100/http://www.securityfocus.com/infocus/1814
[19] M. Ossmann, “WEP: Dead Again, Part 2,” 2005.
https://web.archive.org/web/20060408114130/http://www.securityfocus.com/infocus/1824
[20] R. Chaabouni, Break WEP Faster with Statistical Analysis, June 2006.
[21] 施忠宏,高效率的整合AES加密器與解密器之電路設計,碩士論文-國立交通大學電機資訊學院,電信學程研究所,2005年。[22] 張祐菘,基於AXI4介面的管線是AES矽智財設計與驗證,碩士論文-國立台灣科技大學電子工程系,2019年。