|
[1]W. Stallings, Cryptography and Network Security: Principles and Practice, Fifth Edition, Publisher: Prentice Hall, January 2010. [2]National Institute of Standards and Technology, NIST Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation Methods and Techniques, December 2001. [3]National Institute of Standards and Technology, NIST Special Publication 800-57, Recommendation for Key Management Part 1: General (Revision 3), July 2012. [4]H. Hudde, “Building Stream Ciphers from Block Ciphers and their Security,” Seminararbeit Ruhr-Universität Bochum, February, 2009. http://imperia.rz.rub.de:9085/imperia/md/content/seminare/itsws08_09/hudde.pdf [5]M.Bellare and P. Rogaway, Introduction to Modern Cryptography, chapter 3, May 11, 2005. http://digidownload.libero.it/persiahp/crittografia/2005_Introduction_to_Modern_Cryptography.pdf [6]Y.F. Huang, F.Y. Leu, C.H. Chiu and I.L. Lin, “Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS,” Journal of Universal Computer Science, vol. 17, no.6, March 2011, pp. 891-911. [7]Y.L. Huang, F.Y. Leu, J.C. Liu, J.H. Yang, C.W. Yu, C.C. Chu, C.T. Yang, “Building a block cipher mode of operation with feedback keys,” IEEE International Symposium on Industrial Electronics, May 2013, pp. 1-4. [8]Y.L. Huang, F.Y. Leu, J.H. Yang, “Building a block cipher mode of operation with two keys,” The Asian Conference on Availability, Reliability and Security, March 2013, pp. 392-398. [9]Y.L. Huang and F.Y. Leu, “Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, no. 3, September 2011, pp. 96-107. [10]Y.L. Huang, F.Y. Leu, C.R. Dai, “A secure data encryption method by employing a feedback encryption mechanism and three-dimensional operation,” International Workshop on Security and Cognitive Informatics for Homeland Defense, August 2012, pp.578-592. [11]K.C. Wei, Y.L. Huang, F.Y. Leu, “A secure communication over wireless environments by using a data connection core,” International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2012, pp.570-575. [12]FIPS Publication 46-3, Data Encryption Standard (DES), U.S. DoC/NIST, October 25 1999. [13]FIPS Publication 197, Advanced Encryption Standard (AES), U.S. DoC/NIST, November 26, 2001. [14]C.H. Yang, Network Security: Theory and Practice, Xbook Marketing Co. Ltd., September 2008. [15]N. Kumar, "Investigations in Brute Force Attack on Cellular Security Based on DES and AES," IJCEM International Journal of Computational Engineering & Management, vol. 14, October 2011. [16]D. Wang, D. Lin, and W. Wu, “Related-Mode Attacks on CTR Encryption Mode,” International Journal of Network Security, vol.4, no.3, May 2007, PP.282–287. [17]Wiki, Data Encryption Standard. http://en.wikipedia.org/wiki/Data_Encryption_Standard [18]Wiki, Advanced Encryption Standard. http://en.wikipedia.org/wiki/Advanced_Encryption_Standard [19]Y.S. Yeh, C.Y. Lee, T.Y. Hung and C.H. Lin "A Transpositional Advanced Encryption Standards (AES) Resists 3-Round Square Attack", International Journal of Innovative Computing, Information and Control, vol. 3, no.3, June 2007, pp. 751-759. [20]Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2001. [21]Thomas Chardin and Rapha¨el Marinier, "An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm," International Journal of Network Security, vol.9, no.2, September 2009, pp.173–179. [22]H.M. Heys, "A tutorial on linear and differential cryptanalysis", Technical Report CORR 2001-17, Centre for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, March 2001. [23]H. Lipmaa, P. Rogaway, and D. Wagner, “Comments to NIST concerning AES Modes of Oper-ations: CTR-Mode Encryption”, 2000. http://csrc.nist.gov/
|