1. Design and implementation of crypto co-processor and its application to security systems;Kim,2005
2. Reddy SK, Sakthivel R, Praneet P. VLSI implementation of AES crypto processor for high throughput. In: (IJAEST) International journal of advanced engineering sciences and technologies, vol. 6; 2011. p. 022–6.
3. Managing security in FPGA-based embedded systems;Huffmire;IEEE Des Test Comput,2008
4. Crenne J, Cotret P, Gogniat G, Tessier R, Diguet J-P. Efficient key-dependent message authentication in reconfigurable hardware. In: 2011 International conference on field-programmable technology (FPT’11); 2011. p. 1–6.
5. National Technical Information Service. FIPS 180-2 – secure hash standard, U.S. Department of Commerce/NIST, Springfield, VA; 2002 .