共 11 条
[1]
LimitationsoftheKerberosauthenticationsystem. SMBellovin,MMerritt. ProceedingsoftheWinter1991UsenixCoference . 1991
[2]
Informationtechnology-Securitytechniques-MessageAuthenticationCodes (MACs),Part1:Mechanismsusingablockci-pher1999,Part2:Mechanismsusingahashfunction. ISO/IEC9797 . 2000
[3]
PerformanceanalysisofAEScandidatesonthe6805CPUcore. GKeating. ProceedingsoftheSecondAdvancedEncryptionStandardCandidateConference . 1999
[4]
http://www.nist.gov/aes .
[5]
TripleDataEncryptionAlgorithmModesofOperation. ANSIX9.52 . 1998
[6]
SECURITYREQUI-REMENTSFORCRYPTOGRAPHICMODULES犤S犦. NationalInstituteofStandardsandTechnology. . 2001
[7]
SECURITYREQUI-REMENTSFORCRYPTOGRAPHICMODULES犤S犦. NationalInstituteofStandardsandTechnology. . 1994
[8]
HandbookofAppliedCryptography犤M犦. AJMenezes,PCvanOorschot,SAVanstone. . 1997
[9]
USB Complete. Jan Axelson. . 1999
[10]
TechnicalData-MC68HC908JB8-Rev,1.0. MotorolaInc. . 2000