C. Adams, G. Kramer, S. Mister, and R. Zuccherato, On The Security of Key Derivation Functions, Information Security, vol.3225, pp.134-145, 2004.
DOI : 10.1007/978-3-540-30144-8_12

E. B. Barker, D. Johnson, and M. E. Smid, SP 800-56A. Recommendation for Pair- Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised), 2007.

M. Boesgaard, M. Vesterager, and E. Zenner, The Rabbit stream cipher. New Stream Cipher Designs, pp.69-83, 2008.
DOI : 10.1007/978-3-540-68351-3_7

C. D. Canniere and B. Preneel, Trivium specifications, 2005.

L. Chen, Recommendations for Key Derivation Using Pseudorandom Functions, NIST Special Publication, vol.800, p.108, 2008.
DOI : 10.6028/NIST.SP.800-108

L. Chen, Recommendation for Key Derivation Using Pseudorandom Functions, NIST Special Publication, vol.800, p.108, 2009.
DOI : 10.6028/NIST.SP.800-108

L. Chen, SP 800-56C. Recommendation for Key Derivation through Extractionthen-Expansion, 2011.

D. Eastlake and T. Hansen, US secure hash algorithms (SHA and SHA-based HMAC and HKDF), 2011.
DOI : 10.17487/rfc6234

T. Good and M. Benaissa, Hardware results for selected stream cipher candidates. State of the Art of Stream Ciphers, pp.191-204, 2007.

D. Harkins, Network Working Group G. Zorn Internet-Draft Network Zen Intended status: Standards Track Q, 2011.

B. Kaliski, PKCS# 5: Password-based cryptography specification version 2.0, 2000.
DOI : 10.17487/rfc2898

H. Krawczyk, Cryptographic Extraction and Key Derivation: The HKDF Scheme Advances in Cryptology?CRYPTO 2010, pp.631-648, 2010.

D. Mcgrew and B. Weis, Key Derivation Functions and Their Uses Online available at url http, 2010.

M. Robshaw, The eSTREAM Project. New Stream Cipher Designs, pp.1-6, 2008.

A. Satoh and T. Inoue, ASIC-hardware-focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. INTEGRATION, the VLSI journal, pp.3-10, 2007.
DOI : 10.1016/j.vlsi.2005.12.006

A. Satoh, S. Morioka, K. Takano, and S. Munetoh, A Compact Rijndael Hardware Architecture with S-Box Optimization, Advances in Cryptology?ASIACRYPT 2001, pp.239-254, 2001.
DOI : 10.1007/3-540-45682-1_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.8388

J. H. Song, R. Poovendran, J. Lee, and T. Iwata, The AES-CMAC Algorithm draft-songlee-aes-cmac-02. txt, 2005.

W. Stallings, Cryptography and Network Security: Principles and Practices, Fourth Edition, 2006.

F. F. Yao and Y. L. Yin, Design and Analysis of Password-based Key Derivation Functions, Topics in Cryptology?CT-RSA 2005, pp.245-261, 2005.