|
[1]E. Biham and A. Shamir, “Differential Fault Analysis of Secret Key Cryptosystems,” Advances in Cryptology – CRYPTO’97, Page(s): 513-525. [2]T. P. Chueng, Z.M. Yusoff and A.Z. Sha'ameri, “Implementation of Pipelined Data Encryption Standard (DES) Using Altera CPLD,” Proceedings of TENCON 2000, Volume: 2, 2000 Page(s): 17 -21 vol.3. [3]F.A. Feldman, “A New Spectral Test for Nonrandomness and the DES,” Proceedings of IEEE Transactions on Software Engineering, Volume: 16 Issue: 3, March 1990 Page(s): 261 –267. [4]H. Guendouz and S. Bouaziz, “Rapid Prototype of a Fast Data Encryption Standard with Integrity Processing for Cryptographic Applications,” Proceedings of the 1998 IEEE International Symposium on Circuits and Systems 1998, Volume: 6, 1998 Page(s): 434 -437 vol.6. [5]G. Gong and S.W. Golomb, “Transform Domain Analysis of DES,” Proceedings of IEEE Transactions on Information Theory, Volume: 45 Issue: 6, Sept. 1999 Page(s): 2065 –2073. [6]P. Hämäläinen, M. Hännikäinen, T. Hämäläinen and J. Saarinen, “Configurable Hardware Implementation of Triple-DES Encryption Algorithm for Wireless Local Area Network,” Proceedings of 2001 IEEE International Conference on Acoustics Speech and Signal Processing 2001, Volume: 2, 2001 Page(s): 1221 -1224 vol.2 [7]S.J. Han, H.S. Oh and J. Park, ”The Improved Data Encryption Standard (DES) Algorithm,” Proceedings of IEEE 4th International Symposium on Spread Spectrum Techniques and Applications 1996, Volume: 3, 1996 Page(s): 1310 -1314 vol.3. [8] J.L. Hennessy and D.A. Patterson, Computer Architecture A Quantitative Approach, Second Edition, Morgan Kaufmann Publishers, INC., 1996. [9]T. Korkishko and A. Melnyk, “Crypto Graphic Processor Architectures for DES Algorithm,” Proceedings of 1999 IEEE Africon, Volume: 1, 1999 Page(s): 175 -180 vol.1. [10]L.R. Knudsen and B. Preneel, “MacDES: MAC Algorithm Based on DES,” Proceedings of Electronics Letters, Volume: 34 Issue: 9, 30 April 1998 Page(s): 871 –873. [11]Y.W. Lim, “Efficient 8-Cycle DES Implementation”, Proceedings of the Second IEEE Asia Pacific Conference on ASIC 2000, Page(s): 175 –178. [12]M. McLoone and J.V. McCanny, “A High Performance FPGA Implementation of DES,” Proceedings of 2000 IEEE Workshop on Signal Processing Systems 2000, Page(s): 374 –383. [13]National Institute of Standards and Technology, Advanced Encryption Standard (AES), Federal Information Processing Standards (FIPS) PUB 197, November 2001. [14] National Institute of Standards and Technology, Data Encryption Standard (DES), U.S. Department of Commerce. Federal Information Processing Standards (FIPS) PUB 46-3, October 1999. [15]C. Patterson, “High Performance DES Encryption in Virtex TM FPGAs Using JBitsTM,“ Proceedings of 2000 IEEE Symposium on Field-Programmable Custom Computing Machines, Page(s): 113 –121. [16]R.R. Pai, S. J. Han and M. Lowy, “Design and Implementation of the Extended Data Encryption Standard,” Proceedings of International Conference on Digest of Technical Papers Consumer Electronics 1996, June 5-7 1996 Page(s): 160. [17]Security Technology Group Computer Security Division, National Institute of Standards and Technology, Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures, NIST Special Publication 800-20, April 2000. [18]W. Stallings, Cryptography and Network Security, Principles and Practice, Second Edition, Prentice Hall International, Inc., 1999. [19]M.E. Smid and D.K. Branstad, “Data Encryption Standard: Past and Future,” Proceedings of the IEEE, Volume: 76 Issue: 5, May 1988 Page(s): 550 –559. [20]P.L. Siu, C.S. Choy, J. Butas and C.F. Chan, “A Low Power Asynchronous DES,” Proceedings of 2001 IEEE International Symposium on Circuits and Systems 2001, Volume: 4, 2001 Page(s): 538 -541 vol. 4. [21]T. Schaffer, A. Glaser, S. Rao and P. Franzon, “A Flip-Chip Implementation of the Data Encryption Standard (DES),” Proceedings of 1997 IEEE Multi-Chip Module Conference 1997, Page(s): 13 –17. [22]R.G. Sixel, R.S. Monteiro and M.L. Anido, “A High Level Language Implementation of the Data Encryption Standard and a Bit-Slice Architecture,” Proceedings of the 43rd IEEE Midwest Symposium on Circuits and Systems 2000, Volume: 1, 2000 Page(s): 266 -269 vol.1. [23]I. Verbauwhede, F. Hoornaert, J. Vandewalle and H.J. De Man, “Security and Performance Optimization of a New DES Data Encryption Chip,” IEEE Journal of Solid-State Circuits, Volume: 23 Issue: 3, June 1988 Page(s): 647 –656. [24]I. Verbauwhede, F. Hoornaert, J. Vandewalle and H.J. De Man, “ASIC Cryptographical Processor Based on DES,” Proceedings of Euro ASIC '91, 1991 Page(s): 292 –295. [25]L.Y. Wang, C.S. Laih, H.G. Tsai and N.M. Huang, “On the Hardware Design for DES Cipher in Tamper Resistant Devices Against Differential Fault Analysis,” Proceedings of 2000 IEEE International Symposium on Circuits and Systems 2000, Volume: 2, 2000 Page(s): 697 -700 vol.2. [26]L. Wu, C. Weaver and T. Austin, “CryptoManiac: A Fast Flexible Architecture for Secure Communication,” Proceedings of 28th Annual International Symposium on Computer Architecture 2001, Page(s): 110 –119. [27]K. Wong, M. Wark and E. Dawson, “A Single-Chip FPGA Implementation of the Data Encryption Standard (DES) Algorithm”, Proceedings of IEEE Global Telecommunications Conference, Volume: 2, 1998 Page(s): 827 -832 vol.2.
|