1. (1) Y. M. Pa Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and C. Rossow : “IoTPOT: Analysing the Rise of IoT Compromises”, Proc. of the 9th USENIX Workshop on Offensive Technologies (WOOT'15) (2015) https://www.usenix.org/system/files/conference/woot15/woot15-paper-pa.pdf
2. (2) Federal Information Processing Standards (FIPS) Publication 197 : “Advanced Encryption Standard (AES)”, U. S. Department of Commerce / National Institute of Standard and Technology (2001)
3. (3) D. Suzuki, T. Sugawara, and N. Saeki : “On Hardware Implementation of Lightweight / Low-Latency Cryptography”, Proc. of Symposium on Cryptography and Information Security (SCIS 2014), 2A2-2, pp. 1-6 (2014) (in Japanese)
4. (4) S. Banik, A. Bogdanov, T. Isobe, K. Shibutani, H. Hiwatari, T. Akishita, and F. Regazzoni : “Midori: A Block Cipher for Low Energy”, Proc. of ASIACRYPT2015, LNCS 9453, pp. 411-436, Springer (2015)
5. (5) A. Bogdanav, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe : “PRESENT: An Ultra-Lightweight Block Cipher”, Proc. of Workshop Cryptographic Hardware and Embedded Systems (CHES 2007), LNCS 4727, pp. 450-466, Springer-Verlag (2007)