1. [1] National Institute of Standards and Technology (NIST): Advanced Encryption Standard (AES) FIPS Publication 197 (2001) http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
2. [2] M.M. Wong, et al.: “Composite field GF(((22)2)2) Advanced Encryption Standard (AES) S-box with algebraic normal form representation in the subfield inversion,” IET Circuits Dev. Syst. 5 (2011) 471 (DOI: 10.1049/iet-cds.2010.0435).
3. [3] M.M. Wong, et al.: “Construction of optimum composite field architecture for compact high-throughput AES S-boxes,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 20 (2012) 1151 (DOI: 10.1109/TVLSI.2011.2141693).
4. [4] X. Zhang and K.K. Parhi: “Implementation approaches for the advanced encryption standard algorithm,” IEEE Circuits and Systems Magazine 2 (2002) 24 (DOI: 10.1109/MCAS.2002.1173133).
5. [5] Y.-K. Lai, et al.: “A novel memoryless AES cipher architecture for networking applications,” Proc. IEEE Int. Symposium on Circuits and Systems (ISCAS’04) (2004) IV-333 (DOI: 10.1109/ISCAS.2004.1329008).