A shift column different offset for better Rijndael security
The strength of an encryption algorithms depends on the key’s secrecy combined with the structure of the block cipher that is able to produce random output. The goal of a strong symmetric key encryption algorithm is that there is no way to decrypt the data except by knowledge of the key and there is...
| Main Authors: | Mahmod, Ramlan, Ali, Sherif Abdulbari, Abd Ghani, Abdul Azim |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Malaysian Society for Cryptology Research
2009
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/51913/ http://psasir.upm.edu.my/id/eprint/51913/1/A%20shift%20column%20different%20offset%20for%20better%20Rijndael%20security.pdf |
Similar Items
Key transformation approach for Rijndael security.
by: Muda, Zaiton, et al.
Published: (2010)
by: Muda, Zaiton, et al.
Published: (2010)
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008)
by: Sulong, Mek Rahmah
Published: (2008)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)
by: Mohd Ali, Fakariah Hani
Published: (2004)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
The new approach of Rijndael key schedule
by: Sulaiman, Salasiah, et al.
Published: (2012)
by: Sulaiman, Salasiah, et al.
Published: (2012)
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
by: Hussien, Hassan Mansour, et al.
Published: (2017)
by: Hussien, Hassan Mansour, et al.
Published: (2017)
Offsets and Risk
by: Middle, Garry
Published: (2012)
by: Middle, Garry
Published: (2012)
Discounting for biodiversity Offsets
by: Bond-Smith, Steven
Published: (2012)
by: Bond-Smith, Steven
Published: (2012)
New key expansion function of rijndael 128-bit resistance to the related-key attacks
by: Hussien, Hassan Mansur, et al.
Published: (2018)
by: Hussien, Hassan Mansur, et al.
Published: (2018)
Filtering events using clustering in heterogeneous security logs
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
A proof-producing machine-code analyzer for secure information flow
by: Muthana, Abdulrahman Ahmad Abdu, et al.
Published: (2008)
by: Muthana, Abdulrahman Ahmad Abdu, et al.
Published: (2008)
A distributed push-based XML access control model for better scalability
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2008)
Applicability of Zero-offset and Offset VSP for Time-lapse monitoring - CO2CRC Otway Project Case Study
by: Pevzner, Roman, et al.
Published: (2010)
by: Pevzner, Roman, et al.
Published: (2010)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
Congestion offsets: Transforming cities by letting buses compete
by: Bradley, Matthew, et al.
Published: (2012)
by: Bradley, Matthew, et al.
Published: (2012)
Phishdentity : Leverage Website Favicon to Offset Phishing Website
by: Choo, Jeffrey Soon Fatt
Published: (2015)
by: Choo, Jeffrey Soon Fatt
Published: (2015)
Design Of SIW Bandpass Filter With 6 Db Offset
by: Zakaria, Zahriladha, et al.
Published: (2011)
by: Zakaria, Zahriladha, et al.
Published: (2011)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Security Management Model for Mobile Databases Transaction Management
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
Phase offset analysis of asymmetric communications infrastructure in smart grid
by: Hasan, Mohammad Kamrul, et al.
Published: (2019)
by: Hasan, Mohammad Kamrul, et al.
Published: (2019)
Galaxy Zoo: finding offset discs and bars in SDSS galaxies
by: Kruk, Sandor J., et al.
Published: (2017)
by: Kruk, Sandor J., et al.
Published: (2017)
Zone Tax Offset: Submission no.1 and Response no. DR 102
by: Fullarton, Lex
Published: (2019)
by: Fullarton, Lex
Published: (2019)
Offset reduction technique for motion control of two wheeled wheelchair
by: Ahmad, Salmiah
Published: (2012)
by: Ahmad, Salmiah
Published: (2012)
Adaptive interference canceller using analog algorithm with offset voltage
by: Mohammed, Alaa Hadi
Published: (2015)
by: Mohammed, Alaa Hadi
Published: (2015)
Implementation of cleaner production strategies for offset lithography printing industry / Ramli Abd Rahman
by: Ramli, Abd Rahman
Published: (2017)
by: Ramli, Abd Rahman
Published: (2017)
Prototype of New Composite Weightage and Offset Thickness Design of Acetabular Cup in THR
by: Abd Manap, Muhammad Faris, et al.
Published: (2020)
by: Abd Manap, Muhammad Faris, et al.
Published: (2020)
How to help your graduates secure better jobs? An industry perspective
by: Chi, C., et al.
Published: (2009)
by: Chi, C., et al.
Published: (2009)
Security analysis of blowfish algorithm
by: Alabaichi, Ashwak Mahmood, et al.
Published: (2013)
by: Alabaichi, Ashwak Mahmood, et al.
Published: (2013)
Valuing climate protection by offsetting carbon emissions: rethinking environmental governance
by: Rafia, Afroz
Published: (2014)
by: Rafia, Afroz
Published: (2014)
Is there value in highly spatially sampled zero-offset vertical seismic profiles?
by: Dean, Tim, et al.
Published: (2016)
by: Dean, Tim, et al.
Published: (2016)
Waveguide properties recovered from shallow diffractions in common offset GPR
by: Strobach, Elmar, et al.
Published: (2013)
by: Strobach, Elmar, et al.
Published: (2013)
Uncertainties in local anisotropy estimation from multi-offset VSP Data
by: Asgharzadeh, Mehdi, et al.
Published: (2012)
by: Asgharzadeh, Mehdi, et al.
Published: (2012)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Designing of skull defect implants using C1 rational cubic Bezier and offset curves
by: Najihah, Mohamed, et al.
Published: (2015)
by: Najihah, Mohamed, et al.
Published: (2015)
Removal of Decaying DC Offset in Current Signals for Power System Phasor Estimation
by: Amir A. A., Eisa, et al.
Published: (2008)
by: Amir A. A., Eisa, et al.
Published: (2008)
Spatially offset Raman spectroscopy: from instrumentation to applications in monitoring bone regeneration
by: Dooley, Max Jordan
Published: (2021)
by: Dooley, Max Jordan
Published: (2021)
Host Galaxy Properties and Offset Distributions of Fast Radio Bursts: Implications for Their Progenitors
by: Heintz, K.E., et al.
Published: (2020)
by: Heintz, K.E., et al.
Published: (2020)
Population connectivity and genetic offset in the spawning coral Acropora digitifera in Western Australia
by: Adam, Arne A.S., et al.
Published: (2022)
by: Adam, Arne A.S., et al.
Published: (2022)
Similar Items
-
Key transformation approach for Rijndael security.
by: Muda, Zaiton, et al.
Published: (2010) -
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009) -
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008) -
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017) -
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004)