Author:
Msgna Mehari G.,Walter Colin D.
Reference37 articles.
1. L. E. Bassham, III. The Advanced Encryption Standard Algorithm Validation Suite (AESAVS). NIST Cryptographic Algorithm Validation Program (CAVP), February 2002. http://csrc.nist.gov/groups/STM/cavp/documents/aes/AESAVS.pdf
2. M. Bates. Interfacing PIC Microcontrollers: Embedded Design by Interactive Simulation. Elsevier, 2006.
3. R. M. Best. Preventing Software Piracy with Crypto-Microprocessors. In Proc. IEEE Spring COMPCON ’80, pages 466–469. IEEE Computer Society, 25–28 Feb, 1980.
4. E. Biham and A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems. In Advances in Cryptology - CRYPTO ’90, volume 537 of Lecture Notes in Computer Science, pp. 2–21. Springer, 1991. http://dl.acm.org/citation.cfm?id=646755.705229
5. E. Biham and A. Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In Advances in Cryptology - CRYPTO ’97, volume 1294 of Lecture Notes in Computer Science, pp. 513–525. Springer, 1997. http://dl.acm.org/citation.cfm?id=646762.706179