1. Stallings W (2006) Cryptography and network security: principles and practice. Pearson Education, Delhi
2. Chen L (2014) Research on and application of IoT-based information security transmission system. Master’s thesis of North China University of Technology, Beijing
3. Yanting R (2015) Utilization of information about side channel attack for cipher chips and research on comprehensive defense technologies. Master’s thesis of Tsinghua University, Beijing
4. Koç ÇK (2009) Cryptographic engineering. Springer, New York
5. Kent S, Corp B, Atkinson R. Security architecture for the internet protocol [EB/OL]. https://tools.ietf.org/html/rfc2401.html . Accessed 01 Nov 1998