1 원동호, "현대 암호학" 도서출판 그린 2006
2 주학수, "고속 암호연산 프로세서 개발현황" 12 (12): 48-56, 2002
3 A. Ashkenazi, "Security Features in the i.MX31 and i.MX31L Multimedia Applications Processors"
4 "Proven Security IP for Next-Generation SOCs"
5 R.F. Buskey, "Protected JTAG" 405-414, 2006
6 J. Grand, "Practical Secure Hardware Design for Embedded Systems" 2004
7 "IEEE Standard Test Access Port and Boundary-Scan Architecture, IEEE Standard 1149.1, 2001"
8 ARM, "Designing with TrustZone - Hardware Requirements"
9 B. Schneier, "Applied cryptography, 1996"
10 "Am29LV800D datasheet"
1 원동호, "현대 암호학" 도서출판 그린 2006
2 주학수, "고속 암호연산 프로세서 개발현황" 12 (12): 48-56, 2002
3 A. Ashkenazi, "Security Features in the i.MX31 and i.MX31L Multimedia Applications Processors"
4 "Proven Security IP for Next-Generation SOCs"
5 R.F. Buskey, "Protected JTAG" 405-414, 2006
6 J. Grand, "Practical Secure Hardware Design for Embedded Systems" 2004
7 "IEEE Standard Test Access Port and Boundary-Scan Architecture, IEEE Standard 1149.1, 2001"
8 ARM, "Designing with TrustZone - Hardware Requirements"
9 B. Schneier, "Applied cryptography, 1996"
10 "Am29LV800D datasheet"