메뉴 건너뛰기




Volumn 1717, Issue , 1999, Pages 37-48

A DES ASIC suitable for network encryption at 10 gbps and beyond

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION SPECIFIC INTEGRATED CIRCUITS; DATA PRIVACY; EMBEDDED SYSTEMS;

EID: 84949491507     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48059-5_5     Document Type: Conference Paper
Times cited : (26)

References (7)
  • 1
    • 0005403683 scopus 로고    scopus 로고
    • Straw Ballot, STR-SECURITY-01.00, The ATM Forum, Mountain View, CA, Decembe
    • The ATM Forum Technical Committee, ATM Security Specification Version 1.0, Straw Ballot, STR-SECURITY-01.00, The ATM Forum, Mountain View, CA, December 1997.
    • (1997) ATM Security Specification Version 1.0
  • 2
    • 33645492588 scopus 로고
    • National Bureau of Standards, Washington, D.C., December 3
    • Data Encryption Standard (FIPS PUB 46-2), Federal Information Processing Standards Publication 46-2, National Bureau of Standards, Washington, D.C., December 30, 1993.
    • (1993) Federal Information Processing Standards Publication 46-2
  • 3
    • 84888388890 scopus 로고
    • National Bureau of Standards, Washington, D.C., December
    • DES Modes of Operation (FIPS PUB 81), Federal Information Processing Standards Publication 81, National Bureau of Standards, Washington, D.C., December 2, 1980.
    • (1980) Federal Information Processing Standards Publication 81
  • 4
    • 84949484170 scopus 로고    scopus 로고
    • http://www.eff.org/descracker, January 1999.
    • (1999)
  • 6
    • 0019587141 scopus 로고
    • On the Security of Multiple Encryption
    • Jul
    • Merkle, Ralph C., and Martin E. Hellman, “On the Security of Multiple Encryption,” Communications of the ACM, Vol. 24, No. 7, p. 465-467, July 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.7 , pp. 465-467
    • Merkle, R.C.1    Hellman, M.E.2
  • 7
    • 0003855464 scopus 로고    scopus 로고
    • 2nd edition, John Wiley & Sons, New Yor
    • Schneier, Bruce, Applied Cryptography, 2nd edition, John Wiley & Sons, New York, 1996.
    • (1996) Applied Cryptography
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.