dc.identifier.citation |
[1] “Cracking DES. Secrets of encryption research, wiretap politics and chip design”, Electronic Frontier Foundation, May 1998. [2] Ghada Abdelmouez M., Fathy S. Helail, and Abdellatif A. Elkouny, “New DES based on Elliptic Curves,” World Academy of Science, Engineering and Technology, 63, March 2010. [3] Ghada Abdelmouez M., Fathy S. Helail, and Abdellatif A. Elkouny, “Elliptic Curve Cryptographic based DES Reinforcement,” ICGSTCNIR Journal, Volume 10, Issue 1, December 2010. [4] Paar C, Jan Pelzl, Understanding Cryptography A Textbook for Students and Practitioners , Springer-Verlag Berlin Heidelberg, Germany, pp 70-71, 2010. [5] “Data Encryption Standard (DES)”, FIPS PUB 46-3 Federal Information Processing Standards Publications, U.S. Department of Commerce/National Institute of Standards and Technology, October 25, 1999. [6] H. Darrel, A Menezes., S. Vanstone: Guide to Elliptic Curve Cryptography, Springer- Verlag New York, Inc., 2004. [7] Paar C.: Implementation Options for Finite Field Arithmetic for Elliptic Curve Cryptosystems ECC, Worcester Polytechnic Institute, USA, 1999. [8] E. Matthew, The Weierstrass Theory For Elliptic Functions, Department of Mathematics, MACS Herriot Watt University, Edinburgh, The Burn 2007. [9] N. Torri, K. Yokoyama, Elliptic Curve Cryptosystems, Fujtsu Sci. Tech. J. pp. 140-146, December 2002. [10] A. Stuart, Encryption and Security: the Advanced Encryption Standard, EDN, October, 2002. [11] Poettering.AVRAES:TheAESblockcipheronAVRcontrollers,2006. http://point-at-infinity.org/avraes/ [12] S. Wiliam, Cryptography and Network Security Principles and Practices, Fourth Edition, Prentice Hall, November 16, 2005. [13] Hugo Fruehauf , “Encryption Fundamentals,” in Zyfers, October 2001. [14] Thomas Wollinger, Jorge Guajardo, and Christof Paar, “Cryptography in Embedded Systems: An Overview,” Embedded World 2003 Exhibition and Conference, pp. 735-744, Design & Elektronik, Nuernberg, Germany, February 18-20, 2003. [15] Archana Ramachandran, Zhibin Zhou, and Dijiang Huang, Computing Cryptographic Algorithms in Portable and Embedded Devices, in Proceedings of the IEEE International Conference on Portable Information Devices (PORTABLE), pages 1-7, 2007. [16] Chung-Chu Chia and Shuenn-Shyang Wang, “Efficient design of an embedded microcontroller for Advanced Encryption Standard,” Proceeding of the 2005 Workshop on Consumer Electronics and Signal Processing (WCEsp 2005). [17] Anton Kargl, Stefan Pyka and Hermann Seuschek, “Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography,” context of the SMEPP project (Secure Middleware for Embedded Peer-to-Peer Systems, FP6 IST-5-033563). [18] Axel Sikora, “Implementing DES/3DES with Atmel FPSLIC,” ATMEL Corporation, Security Application, University of Cooperative Education Loerrach, Germany, 2002. www.atmel.com [19] D. S. Abdul Elminaam, H. M. Abdul Kader, M. M. Hadhoud, Performance Evaluation of Symmetric Encryption Algorithms, Communications of the IBIMA Volume 8, 2009 ISSN: 1943-7765. |
en_US |