[1]
|
Bright, P. (2012) Claimed HDCP Master Key Leak Could Be Fatal to DRM Scheme. Cited: 16 July 2012, Online.http://arstechnica.com/tech-policy/2010/09/claimed-hdcp-master-key-leak-could-be-fatal-to-drm-scheme/
|
[2]
|
HDCP Technologies-Digital Content Protection, LLC. (2012) Cited: 28 July 2012, Online.http://www.digital-cp.com/hdcp_technologies
|
[3]
|
Westerkamp, D. (2007) HDMI and HDCP—The Manufacturer’s Perspective. EICTA Article.
|
[4]
|
Evain, J. (2012) HDCP—The FTA Broadcasters’ Perspective. Cited: 25 July 2012, Online. http://www.ebu.ch/fr/technical/trev/trev_312-eviain_hdcp.pdf
|
[5]
|
Johnson, R., Rubnich, M. and DelaCruz, A. (2011) Implementing a Key Recovery Attack on the High-Bandwidth Digital Content Protection Protocol. Proceedings of Consumer Communications and Networking Conference (CCNC) IEEE 2011, Las Vegas, 9-12 January 2011.
|
[6]
|
Roettgers, J. (2012) Scientists Release HDCP Decryption Tool. Cited: 24 July 2012, Online. http://gigaom.com/video/scientists-release-hdcp-decryption-tool/
|
[7]
|
Crosby, S., et al. (2012) A Cryptanalysis of High Bandwidth Digital Content Protection System. Proceedings of the 2002 ACM Digital Rights Management Workshop, Alexandria, October 30-November 3, 2006, 192-200.
|
[8]
|
HDCP Deciphered: Digital Content Protection LLC. White Paper, 2008.
|
[9]
|
Candelore, B. and Diego, S. (2009) Wireless Video Communication. United States Patents: US2009/0103471 A1. April 23.
|
[10]
|
Zhao, J.J., et al. (2011) On Weaknesses of the HDCP Authentication and Key Exchange Protocol and Its Repair. Elsevier Journal, 19-25.
|
[11]
|
LLC Digital Content Protection (2008) High Bandwidth Digital Content Protection System: Interface Independent Adaptation.
|
[12]
|
Stockfisch, M. (2007) HDMI/DVI HDCP Handshake Problems and How to Avoid Them. Quantum Data Inc. White Paper.
|
[13]
|
Schneier, B. (1996) Applied Cryptography: Protocols, Algorithms and Source Code.
|
[14]
|
Bourbakis, N. and Dollas, A. (2003) Scan-Based Compression-Encryption Hiding for Video on Demand. IEEE Multimedia Magazine, 10, 79-87. http://dx.doi.org/10.1109/MMUL.2003.1218259
|
[15]
|
Shiguo, L., Jinsheny, S. and Zhiquan, W. (2005) A Block Cipher Based for the Chaotic Standard Map. Chaos, Solutions and Fractals, 26, 117-129.
|
[16]
|
Li, S.J., Zheng, X., Mou, X.Q. and Cai, Y.L. (2002) Chaotic Encryption Scheme for Real Time Digital Video. Proceedings of SPIE, 4666, 149-160.
|
[17]
|
Rouse, M. (2012) What Is Initialization Vector (IV)? http://whatis.techtarget.com/definition/initialization-vector-IV
|
[18]
|
Gaj, K. and Chodowiec, P. (2001) Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer’s Track at RSA CT-RSA 2001, San Francisco, 8-12 April 2001, 84-99.
|
[19]
|
Hodjat, A. and Verbauwhede, I. (2004) A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA. Processing of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, Napa, 20-23 April 2004, 308-309.
|
[20]
|
Janvinen, K., Tominisko, M. and Skytta, J. (2003) A Fully Pipelined Memoryless 17, 8 Gpbs AES-128 Encryptor. Proceedings of the International Symposium on Field Programmable Gate Arrays, Monterey, 23-25 February 2003, 207-215.
|
[21]
|
Mclone, M. and McCanny, J. (2003) Rijindael FPGA Implementations Utilizing Look-Up Tables. Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology, 34, 261-275. http://dx.doi.org/10.1023/A:1023252403567
|
[22]
|
Shannon, C.E. (1949) Communication Theory of Secrecy System. Bell System Technical Journal, 28, 656-715.
|
[23]
|
Zeghid, M., Machhout, M., Khriji, L., Baganne, A. and Tourki, R. (2007) A Modified AES Based Algorithm for Image Encryption. World Academy of Science, Engineering and Technology, 1, 10.http://www.waset.org/journals/waset/v3/v3-86.pdf
|
[24]
|
Wildlife Refuge by Golacula 153 Views-Wildlife.avi. August 2011.http://www.youtube.com/watch?v=ft9XGMd8I4c
|