|
[1] W. Stallings, Cryptography and Network Security Principles and Practice, Prentice Hall, 1999.[2] D. Weissman, D. W. Dudich and M. S. Grob, "End-to-End Security for Commercial PCS Network", IEEE MILCOM''95, vol. 3, pp. 1253-1257, Nov. 1995. [3] F. Warwick, S. B. Michael, Secure Electronic Commerce, Prentice Hall, 1997.[4] R. M. Yang, "Development at Today and trend of Eectronic Commerce", Information Security Newsletter, CCISA, vol. 5, no.2, pp. 34-35, Mar. 1999.[5] J. Z. Huang, "A Preface of Special Compilation", Information Security Newsletter, CCISA, vol. 5, no.2, pp. 33, Mar. 1999.[6] R. L. Rivest, M. E. Hellman, J. C. Anderson, and J. W. Lyons, "Responses to NIST''s Proposal", Communications of the ACM, vol. 35, no.7, pp.41-54, jul. 1992. [7] H. C. A. van Tillborg, An Introduction to Cryptology, Kluwer Academic Publishers, 1989.[8] W. G. Barker, Cryptanalysis of Shift-Register Generated Stream Cipher Systems, 1984.[9] R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.[10] J. H. Chiu, "Stream Cihper", Manuscript Lecture, 1997. [11] C. S. Laih, L. Harn and C. C. Chang, Contemporary Cryptography and Its Applications, UNALIS, 1995.[12] B. Schneier, Applied Cryptography - Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., 1996.[13] D. G. W. Birch and I. J. Shaw, "Mobile Communication Security-Private or Public", Security and Cryptography Application to Radio Systems, IEE Colloquium on, pp. 5/1-5/6, Jun. 1994. [14] M. Soriano, "Stream Ciphers Based on NLFSR", Telecommunications Symposium, vol. 2, pp. 528-533, Aug. 1998.[15] C. C. Lo, Y. J. Chen, "A Secure Communication Architecture for GSM Network", Communications, Computers and Signal Processing, 1999 IEEE Pacific Rim Conference on, pp. 221-224, Aug. 1999.[16] C. C. Lo, Y. J. Chen, "Stream Cipher for GSM Networks", Communications, 2000. ICC 2000 IEEE International Conference on, vol. 1, pp. 80-84, Jun. 2000.[17] S. Sengodan, D. Smith and M. Abou-Rizk, "On End-to-End Security for Bluetooth/WAP and TCP/IP Networks", Personal Wireless Communications, 20000 IEEE International Conference on, pp. 399-403, Dec. 2000.[18] K. Zeng, C. H. Yang, D. Y. Wei and T.R.N. Rao, "Pseudorandom Bit Generators in Stream-Cipher Cryptography", Computer, vol. 24, issue 2, pp. 8-17, Feb. 1991.[19] G. L. Mayhew, "A Low Cost, High Speed Encryption System and Method", Research in Security and Privacy, 1994. Proc., 1994 IEEE Computer Society Symposium on, pp. 147-154, May. 1994.[20] M. H. Shao and J. Z. Huang, "Cryptography technique of SET : evaluation of an advantage and a fault", Information Security Newsletter, CCISA, vol. 6, no.1, pp. 50-61, Dec. 1999.[21] C. H. Lin, "Security Eectronic Commerce of Network", Information Security Newsletter, CCISA, vol. 5, no.2, pp. 67-71, Mar. 1999.[22] F. L. Mayer, W. C. Barker, T. K. Haley, J. N. McAuliffe, D. F. Sterne and L. S. Vidmar, "Evaluation Issue for an Integrated "INFOSEC" Product", Computer Security Applications Conference, pp. 271-275, Dec. 1989.[23] R. Benjamin, "Security Considerations in Communications Systems and Network", Communications, Speech and Vision, IEE Proc. I, vol. 137, issue 2, pp. 61-72, Apr. 1990.[24] D. R. Stinson, Cryptography Theory and Practice, Boca Raton, Fla. CRC Press, 1995.[25] R. A. Rueppel, "Good Stream Cipher are Hard to Design", Security Technology, 1989. Proc. 1989 International Carnahan Conference on, pp. 163-174, Oct. 1989.[26] N.I.S.T., Announcing the Advanced Encryption Standard (AES), http://csrc.nist.gov/encryption/aes/, 2001.[27] A. J. Elbirt, W. Yip, B. Chetwynd, and C. Paar, "An FPGA-Based Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists", Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, vol. 9, issue 4, pp. 545-557, Aug. 2001.[28] C. S. Laih, "Information Security Actions and Development of R.O.C.", Information Security Newsletter, CCISA, vol. 5, no.2, pp. 20-32, Mar. 1999.[29] W. T. Penzhorn, "Complexity Measures for Cryptographic Sequences", COMSIG 1991 Proc., pp. 178-185, Aug. 1991.[30] A. H. Chan, M. Goresky, and A. Klapper, "On the Linear Complexity of Feedback Registers", IEEE Trans. Information Theory, vol. 36, no.3, pp. 640-644, May. 1990.[31] X. M. Wang and G. Xiao, Error Correcting Code - Principle and method, Ru-Lin Books Co., 1991.[32] W. G. Chambers, "Clock-Controlled Shift Registers in Binary Sequence", IEE Proc., vol. 135, no.1, pp. 17-24, Jan. 1988.[33] D. GOLLMANN and W. G. CHAMBERS, "Clock-Controlled Shift Register: A Review", IEEE Journal on Selected Areas in Communications, vol. 7, no.4, pp. 525-533, May. 1989.[34] J. D. Golic, "Cryptanalysis of There Mutually Clock-Controlled Stop-and-Go Shift Register", IEEE Trans. on Information Theory, vol. 46, no.3, pp. 1081-1089, May. 2000.[35] R. Menicocci, J. D. Golic, "Correlation Attacks on Up/Down and Stop-and-Go Cascades", IEEE Trans. on Information Theory, vol. 45, no.2, pp. 486-498, Mar. 1999.[36] W. G. Chambers, D. Gollmann, "Generators for Sequences with Near-Maximal Linear Equivalence", Computers and Digital Techniques, IEE Proc. E, vol. 135, issue 1, pp. 67-69, Jan. 1988.[37] C. K. Chan, L. M. Cheng, "Design of Keystream Generator", Electronics Letters, vol. 34, no.12, pp. 1206-1207, Jun. 1998.[38] K. Chakrabarty, J. P. Hayes, "Balanced Boolean Functions", Computers and Digital Techniques, IEE Proc. on, vol. 145, issue 1, pp. 52-62, Jan. 1998.[39] M. M. Alabbadi, R. M. Alrumiah, and M. Adi, "On the Comparison of Pseudo-random Number Generator for VLSI Applications", Microelectronics, 1998. ICM ''98. Proc. of the Tenth International Conference on, pp. 262-264, Dec. 1998.[40] W. N. Havener, R. J. Medlock, L. D. Mitchell, R. J. Walcott, Derived Test Requirements for FIPS PUB 140-1, Security Requirements for Cryptographic Modules, N.I.S.T., Mar. 1995.[41] CCISA, "Technology Standard of Communications Cryptographic Modules and Project of Development Related verify Technology", CCISA, vol. 6, no.2, pp. 37-66, Mar. 2000.[42] E. Dawson, A. Clark, H. Gustafson, L. Nielsen and M. Rutherford,CRYPT-X''98, Queensland University of Technology, 1998.[43] M. McLoone and J. V. McCanny, "A High Performance FPGA Implementation of DES", Signal Proc. Systems. 2000. SiPS 2000. 2000 IEEE Workshop on, pp. 374-383, Oct. 2000.[44] W. Millan, K. Wong, M. Wark and E. Dawson, "A Single-Chip FPGA Implementation of A Self-Synchronous Cipher", TENCON''97. IEEE, vol. 1, pp. 223-226, Dec. 1997.[45] K. Wong, M. Wark and E. dawson, "A Single-Chip FPGA Implementation of The Data Encryption Standard (DES) Algorithm", GLOBECOM 1998, vol. 2, pp. 827-832, Nov. 1998.[46] ALTERA 1998 DATA BOOK, Altera Co., 1998. [47] G. Tsudik, "Message Authentication with One-Way Hash Functions", INFOCOM ''92, vol. 3, pp. 2055-2059, May. 1992.
|