Key Transformation Approach for Rijndael Security
Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen in 1999. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128- bit Rijndael Key Schedule does not s...
| Main Author: | Sulong, Mek Rahmah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/5895/ http://psasir.upm.edu.my/id/eprint/5895/1/FSKTM_2008_3%20IR.pdf |
Similar Items
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
Key transformation approach for Rijndael security.
by: Muda, Zaiton, et al.
Published: (2010)
by: Muda, Zaiton, et al.
Published: (2010)
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
A modified approach to improve the performance of AES using feistel structure
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Development of DNA-based dynamic key-dependent block cipher
by: Saeed, Auday H.
Published: (2015)
by: Saeed, Auday H.
Published: (2015)
Development of authentication code based on spectral amplitude coding optical code division multiplexing for multi-user pseudo quantum key distribution
by: Abiola, Taiwo Ambali
Published: (2018)
by: Abiola, Taiwo Ambali
Published: (2018)
Design of robust and fragile image watermarking system for copyright protection and authentication using lifting wavelet transform and bivariate empirical mode decomposition techniques
by: Abbas, Nidaa Hasan
Published: (2017)
by: Abbas, Nidaa Hasan
Published: (2017)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)
by: Rezaeipour, Davood
Published: (2011)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
by: Ahmed, Shakil
Published: (2013)
by: Ahmed, Shakil
Published: (2013)
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
by: Shereek, Balkees Mohamed
Published: (2016)
by: Shereek, Balkees Mohamed
Published: (2016)
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009)
by: Ahmed Alomari, Mohammad
Published: (2009)
Encryption selection for WLAN IEEE802.11G
by: Ahmad, Zahrol Azam
Published: (2013)
by: Ahmad, Zahrol Azam
Published: (2013)
Some statistical simulation results over the 128-bit block cipher CLEFIA
by: Rezaeipour, Davood, et al.
Published: (2009)
by: Rezaeipour, Davood, et al.
Published: (2009)
Effects of variation theory-based strategy on form two students' algebraic achievement and motivation
by: Ting, Jing Jing
Published: (2016)
by: Ting, Jing Jing
Published: (2016)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
The new approach of Rijndael key schedule
by: Sulaiman, Salasiah, et al.
Published: (2012)
by: Sulaiman, Salasiah, et al.
Published: (2012)
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
by: Md Yasin, Sharifah
Published: (2011)
by: Md Yasin, Sharifah
Published: (2011)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
Implementation of data security system in Tabung Haji and SOCSO
by: Ahmad, Jasmin Ilyani
Published: (2003)
by: Ahmad, Jasmin Ilyani
Published: (2003)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
The impact of security on VoIP call quality
by: Radmand, Pedram, et al.
Published: (2011)
by: Radmand, Pedram, et al.
Published: (2011)
Multimodal fingerprint and face biometrics with fragile watermarking and convolutional neural network
by: Najih, Abdulmawla
Published: (2020)
by: Najih, Abdulmawla
Published: (2020)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
by: Hussien, Hassan Mansour, et al.
Published: (2017)
by: Hussien, Hassan Mansour, et al.
Published: (2017)
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024)
by: Thompson, Benjamin
Published: (2024)
New key expansion function of rijndael 128-bit resistance to the related-key attacks
by: Hussien, Hassan Mansur, et al.
Published: (2018)
by: Hussien, Hassan Mansur, et al.
Published: (2018)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
A shift column different offset for better Rijndael security
by: Mahmod, Ramlan, et al.
Published: (2009)
by: Mahmod, Ramlan, et al.
Published: (2009)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Similar Items
-
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017) -
Key transformation approach for Rijndael security.
by: Muda, Zaiton, et al.
Published: (2010) -
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009) -
A modified approach to improve the performance of AES using feistel structure
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018) -
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)