IEEE Std 802.11i-2004. Part 11: Wireless lAN medium access control (MAC) and physical layer (PHY) specifications amendment 6: Medium access control (MAC) security enhancements[S]. New York, USA, 2004.
[2]
IEEE Std 802.11ac-2013. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 4: enhancements for very high throughput for operation in bands below 6 GHz[S]. New York, USA, 2013.
[3]
TRAN T H, LANANTE L, NAGAO Y, et al. Hardware implementation of high throughput RC4 algorithm[C]//IEEE International Symposium on Circuits and Systems (ISCAS). Seoul, Korea, 2012: 77-80.
[4]
GUPTA S S, CHATTOPADHYAY A, SINHA K, et al. High-performance hardware implementation for RC4 stream cipher[J]. IEEE Transactions on Computers, 2013, 62(4): 730-743.
[5]
SATOH A, MORIOKA S, TAKANO K, et al. A compact Rijndael hardware architecture with S-box optimization[C]//Proc ASIACRYPT. Berlin, 2000: 239-245.
[6]
HSIAO S F, CHEN M C, TU C S. Memory-free low-cost designs of advanced encryption standard using common subexpression elimination for subfunctions in transformations[J]. IEEE Transactions on Circuits and Systems, 2006, 53(3): 615-626.
[7]
WONG M M, WONG M L D, NANDI A K, et al. Construction of optimum composite field architecture for compact high-throughput AES S-boxes[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2012, 20(6): 1151-1155.
[8]
BAE D, KIM G, KIM J, et al. Design and Implementation of efficient cipher engine for IEEE 802.11i compatible with IEEE 802.11n and IEEE 802.11e[J]. Lecture Notes in Computer Science, 2005, 3802:439-444.
[9]
JAIN R. A comparison of hashing schemes for address lookup in computer networks[J]. IEEE Transactions on Communications, 1992, 40(10): 1570-1573.
[10]
BAE D, KIM G, KIM J, et al. An efficient design of CCMP for robust security network[C]//Information Security and Cryptology (ICISC). Busan, Korea, 2006: 352-361.
[11]
GNACIO A B, CLAUDIA F U, RENE C, et al. Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard[J]. Computers and Electrical Engineering, 2010, 36:565-577.
[12]
SMYTH N, MCLOONE M, MCCANNY J. WLAN security processor[J]. IEEE Transactions on Circuits and Systems, 2006, 53(7): 1506-1520.