Key transformation approach for Rijndael security.
The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit contusion and diffusion of the Rijndael subkey, Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen. It is a combination of security, performance, efficiency, implementability and flexi...
| Main Authors: | Muda, Zaiton, Mahmod, Ramlan, Sulong, Mek Rahmah |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Asian Network for Scientific Information
2010
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/15386/ http://psasir.upm.edu.my/id/eprint/15386/1/Key%20transformation%20approach%20for%20Rijndael%20security.pdf |
Similar Items
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008)
by: Sulong, Mek Rahmah
Published: (2008)
The new approach of Rijndael key schedule
by: Sulaiman, Salasiah, et al.
Published: (2012)
by: Sulaiman, Salasiah, et al.
Published: (2012)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
by: Hussien, Hassan Mansour, et al.
Published: (2017)
by: Hussien, Hassan Mansour, et al.
Published: (2017)
New key expansion function of rijndael 128-bit resistance to the related-key attacks
by: Hussien, Hassan Mansur, et al.
Published: (2018)
by: Hussien, Hassan Mansur, et al.
Published: (2018)
A shift column different offset for better Rijndael security
by: Mahmod, Ramlan, et al.
Published: (2009)
by: Mahmod, Ramlan, et al.
Published: (2009)
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
New Key Expansion Function of Rijndael 128-Bit Resistance to The Related-Key Attacks
by: Hussien, Hassan Mansur, et al.
Published: (2018)
by: Hussien, Hassan Mansur, et al.
Published: (2018)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005)
by: Daw, Win Aye
Published: (2005)
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
by: Hussien, Hassan Mansur, et al.
Published: (2019)
by: Hussien, Hassan Mansur, et al.
Published: (2019)
A proposal for improving AES S-box with rotation and key-dependent
by: Juremi, Julia, et al.
Published: (2012)
by: Juremi, Julia, et al.
Published: (2012)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013)
by: Muda, Zaiton, et al.
Published: (2013)
Key elements for transforming food sector
by: Natasha, Jee
Published: (2024)
by: Natasha, Jee
Published: (2024)
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011)
by: Tian, Biming
Published: (2011)
Secure clustering in DSN with key predistribution and WCDS
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Security analysis of blowfish algorithm
by: Alabaichi, Ashwak Mahmood, et al.
Published: (2013)
by: Alabaichi, Ashwak Mahmood, et al.
Published: (2013)
Security Management Model for Mobile Databases Transaction Management
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
R&D key to food security during crises
by: Mohd Ezanee, Adriana Asmaa'
Published: (2022)
by: Mohd Ezanee, Adriana Asmaa'
Published: (2022)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
Security Zone and Key Derivation Management in Centralized Security Control in Wimax Multihop Relay System
by: Adnan, Shahid Khan, et al.
Published: (2010)
by: Adnan, Shahid Khan, et al.
Published: (2010)
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)
by: Al- Bakri, S.H., et al.
Published: (2011)
Suitability of using symmetric key to secure multimedia data: an overview,
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Implementing a secure key exchange protocol for openSSL
by: Alawatugoda, Janaka, et al.
Published: (2018)
by: Alawatugoda, Janaka, et al.
Published: (2018)
Policy monitoring, implementation key to addressing food security issues
by: Ibrahim, Ahmad
Published: (2022)
by: Ibrahim, Ahmad
Published: (2022)
Security of a key agreement protocol based on chaotic maps
by: Han, Song
Published: (2008)
by: Han, Song
Published: (2008)
Key Management for Secure Multicast over IPv6 Wireless Networks
by: Aye, Win, et al.
Published: (2006)
by: Aye, Win, et al.
Published: (2006)
An efficient public key based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Distinctive key management method to secure multicast IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2009)
by: Mehdizadeh, Abbas, et al.
Published: (2009)
Similar Items
-
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008) -
The new approach of Rijndael key schedule
by: Sulaiman, Salasiah, et al.
Published: (2012) -
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017) -
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
by: Hussien, Hassan Mansour, et al.
Published: (2017) -
New key expansion function of rijndael 128-bit resistance to the related-key attacks
by: Hussien, Hassan Mansur, et al.
Published: (2018)