The new approach of Rijndael key schedule
The key schedule function in Rijndael block cipher did not receive the same amount of attention during design as the cipher components. Based on our research, there are several properties in key schedule that seemed to violate the design criteria, which was published by NIST, and this has lead to ma...
| Main Authors: | Sulaiman, Salasiah, Muda, Zaiton, Juremi, Julia |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
IEEE
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/33825/ |
Similar Items
Key transformation approach for Rijndael security.
by: Muda, Zaiton, et al.
Published: (2010)
by: Muda, Zaiton, et al.
Published: (2010)
New key expansion function of rijndael 128-bit resistance to the related-key attacks
by: Hussien, Hassan Mansur, et al.
Published: (2018)
by: Hussien, Hassan Mansur, et al.
Published: (2018)
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008)
by: Sulong, Mek Rahmah
Published: (2008)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
by: Hussien, Hassan Mansour, et al.
Published: (2017)
by: Hussien, Hassan Mansour, et al.
Published: (2017)
A proposal for improving AES S-box with rotation and key-dependent
by: Juremi, Julia, et al.
Published: (2012)
by: Juremi, Julia, et al.
Published: (2012)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
A shift column different offset for better Rijndael security
by: Mahmod, Ramlan, et al.
Published: (2009)
by: Mahmod, Ramlan, et al.
Published: (2009)
New Key Expansion Function of Rijndael 128-Bit Resistance to The Related-Key Attacks
by: Hussien, Hassan Mansur, et al.
Published: (2018)
by: Hussien, Hassan Mansur, et al.
Published: (2018)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
Improving agent-based meeting scheduling through preference learning.
by: Sulaiman, Md. Nasir, et al.
Published: (2009)
by: Sulaiman, Md. Nasir, et al.
Published: (2009)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
by: Mushtaq, Muhammad Faheem
Published: (2019)
by: Mushtaq, Muhammad Faheem
Published: (2019)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
Novel approaches to radiotherapy treatment scheduling
by: Leite Rocha, Pedro
Published: (2011)
by: Leite Rocha, Pedro
Published: (2011)
Priority scheduling approach for heterogeneous systems in an intelligent building environment
by: Soozaei, Ahmad Shahi, et al.
Published: (2015)
by: Soozaei, Ahmad Shahi, et al.
Published: (2015)
Proteomics approaches in identification of key signalling pathways associated with collagen type 1-induced osteogenic differentiation of dental stem cells
by: Nasir, Nur Julia Nabila
Published: (2024)
by: Nasir, Nur Julia Nabila
Published: (2024)
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009)
by: Pour, Davood Rezaei, et al.
Published: (2009)
Ant algorithm hyperheuristic approaches for scheduling problems
by: O'Brien, Ross
Published: (2008)
by: O'Brien, Ross
Published: (2008)
Power routing: a new paradigm for maintenance scheduling
by: Liserre, Marco, et al.
Published: (2020)
by: Liserre, Marco, et al.
Published: (2020)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013)
by: Muda, Zaiton, et al.
Published: (2013)
Library as Scholarly Publishing Partner: Keys to Success
by: McIntyre, Gordon, et al.
Published: (2013)
by: McIntyre, Gordon, et al.
Published: (2013)
Fabrication of periodic nanoparticle arrays using nanosphere lithography technique and thin film gold as electrically enhanced catalysts
by: Md Juremi, Nor Rashidah
Published: (2012)
by: Md Juremi, Nor Rashidah
Published: (2012)
A new public key cryptosystem based on IFS
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
An evolutionary squeaky wheel optimisation approach to personnel scheduling
by: Aickelin, Uwe, et al.
Published: (2009)
by: Aickelin, Uwe, et al.
Published: (2009)
Systematic approach for developing as-built schedule for
construction project
by: Zubair Ahmed Memon,, et al.
Published: (2006)
by: Zubair Ahmed Memon,, et al.
Published: (2006)
Soft computing approach for solving elevator scheduling problem
by: Norzatul Hajar, Abd Majid
Published: (2010)
by: Norzatul Hajar, Abd Majid
Published: (2010)
Simulated annealing approach for an overbooking appointment scheduling problem
by: Ab Rahmin, Nor Aliza, et al.
Published: (2024)
by: Ab Rahmin, Nor Aliza, et al.
Published: (2024)
Integer Programming Approach In Bus Scheduling And Collection Optimization
by: Ismail, Zuhaimy, et al.
Published: (2005)
by: Ismail, Zuhaimy, et al.
Published: (2005)
A new algorithm for routing and scheduling in optical omega network
by: Al-Shabi, Mohammed Abdulhameed Ali, et al.
Published: (2008)
by: Al-Shabi, Mohammed Abdulhameed Ali, et al.
Published: (2008)
RSA with flexible key size: a hardware approach
by: Asaduzzaman, Khandaker, et al.
Published: (2005)
by: Asaduzzaman, Khandaker, et al.
Published: (2005)
Hybrid scheduling and dual queue scheduling
by: A., Oxley, et al.
Published: (2009)
by: A., Oxley, et al.
Published: (2009)
Hybrid scheduling and dual queue scheduling
by: Mahmood, Ahmad Kamil
Published: (2009)
by: Mahmood, Ahmad Kamil
Published: (2009)
Hybrid Scheduling and Dual Queue Scheduling
by: Shah, S.N.M., et al.
Published: (2009)
by: Shah, S.N.M., et al.
Published: (2009)
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
by: Abu, Ahmad Zaidee
Published: (2008)
by: Abu, Ahmad Zaidee
Published: (2008)
Environmental protection in the digitalization era: new trends and key challenges
by: Mustafa, Maizatun
Published: (2019)
by: Mustafa, Maizatun
Published: (2019)
Key exchange for new cryptosystem analogous to LUCELG
and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2013)
by: Muslim, Norliana, et al.
Published: (2013)
New simultaneous Diophantine attacks on generalized RSA key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
Similar Items
-
Key transformation approach for Rijndael security.
by: Muda, Zaiton, et al.
Published: (2010) -
New key expansion function of rijndael 128-bit resistance to the related-key attacks
by: Hussien, Hassan Mansur, et al.
Published: (2018) -
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008) -
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017) -
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
by: Hussien, Hassan Mansour, et al.
Published: (2017)