A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Doing arithmetic in finite field is the key part to the implementation of communication and coding system including the newly developed Rijndael the Advanced Encryption Standard (AES). This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, in...
| Main Author: | Mohd Ali, Fakariah Hani |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/8711/ http://psasir.upm.edu.my/id/eprint/8711/1/FSKTM_2004_5%20IR.pdf |
Similar Items
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
Bitwise operators and type casting
by: Shaikh, Asadullah, et al.
Published: (2011)
by: Shaikh, Asadullah, et al.
Published: (2011)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
Arithmetic deformation theory via arithmetic fundamental groups and nonarchimedean theta functions, notes on the work of Shinichi Mochizuki
by: Fesenko, Ivan
Published: (2015)
by: Fesenko, Ivan
Published: (2015)
Optimal parameter estimation of MISO system based on fuzzy numbers / Razidah Ismail ... [et al.]
by: Ismail, Razidah, et al.
Published: (2006)
by: Ismail, Razidah, et al.
Published: (2006)
A shift column different offset for better Rijndael security
by: Mahmod, Ramlan, et al.
Published: (2009)
by: Mahmod, Ramlan, et al.
Published: (2009)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
by: Asbullah, Muhammad Asyraf
Published: (2015)
by: Asbullah, Muhammad Asyraf
Published: (2015)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar
by: Anuar, Norhasnelly
Published: (2015)
by: Anuar, Norhasnelly
Published: (2015)
An integrated fuzzy approach to solving multi-criteria decision making problems / Nor Hanimah Kamis
by: Kamis, Nor Hanimah
Published: (2009)
by: Kamis, Nor Hanimah
Published: (2009)
Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering
by: Rashed, Alwatben Batoul
Published: (2022)
by: Rashed, Alwatben Batoul
Published: (2022)
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009)
by: Ahmed Alomari, Mohammad
Published: (2009)
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
Steganography For Embedding Data In Digital Image
by: Sowan, Salah Ibrahem
Published: (2003)
by: Sowan, Salah Ibrahem
Published: (2003)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
Factorization strategies of N = pq and N = pʳq and relation to its decryption exponent bound
by: Abubakar, Saidu Isah
Published: (2018)
by: Abubakar, Saidu Isah
Published: (2018)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
ZOT -Mk: A New Algorithm For Big Integer
Multiplication
by: Jahani, Shahram
Published: (2009)
by: Jahani, Shahram
Published: (2009)
Bitwise-based Routing Algorithms in Optical Multistage Interconnection Network
by: Abed, Farzaneh
Published: (2007)
by: Abed, Farzaneh
Published: (2007)
Selection of volleyball players using fuzzy PROMETHEE / Khairunnisa Anuar
by: Anuar, Khairunnisa
Published: (2020)
by: Anuar, Khairunnisa
Published: (2020)
Universiti Teknologi MARA application system using
modified neuro-fuzzy approach / Nor Eleena Yusoff
by: Yusoff, Nor Eleena
Published: (2014)
by: Yusoff, Nor Eleena
Published: (2014)
Ranking the most preferred public transportation in Penang using : fuzzy analytic hierarchy processs FAHP / Nor Syafiqah Zainuddin
by: Zainuddin, Nor Syafiqah
Published: (2019)
by: Zainuddin, Nor Syafiqah
Published: (2019)
Selecting supplier for an optical shop by using Yuen’s fuzzy TOPSIS method / Sharifah Fatin Amirah Syed Fahmey Sham
by: Syed Fahmey Sham, Sharifah Fatin Amirah
Published: (2020)
by: Syed Fahmey Sham, Sharifah Fatin Amirah
Published: (2020)
Comparison between fuzzy and non-fuzzy classification methods in the prediction of residential household water leakage / Nor Aishah Md Noh, Dr. Khairul Anwar Rasmani and Nur Rasyida Mohd Rashid
by: Md Noh, Nor Aishah, et al.
Published: (2013)
by: Md Noh, Nor Aishah, et al.
Published: (2013)
A fuzzy approach to portfolio selection at bursa Malaysia / Wan Rosanisah Wan Mohd
by: Wan Mohd, Wan Rosanisah
Published: (2014)
by: Wan Mohd, Wan Rosanisah
Published: (2014)
Comparison between artifical neural network and fuzzy time series to predict road accident / Nur Athirah Mohd Khalil
by: Mohd Khalil, Nur Athirah
Published: (2019)
by: Mohd Khalil, Nur Athirah
Published: (2019)
Two phase fuzzy multicriteria model to evaluate teaching / Mahmod Othman, Ku Ruhana Ku Muhamud and Azuraliza Abu Bakar
by: Othman, Mahmod, et al.
Published: (2006)
by: Othman, Mahmod, et al.
Published: (2006)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006)
by: Mohamed Khmag, Asem Ib.
Published: (2006)
Analysis of the RLMS Adaptive Beamforming Algorithm Implemented with Finite Precision
by: Srar, Jalal Abdulsayed, et al.
Published: (2010)
by: Srar, Jalal Abdulsayed, et al.
Published: (2010)
Similar Items
-
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009) -
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017) -
Bitwise operators and type casting
by: Shaikh, Asadullah, et al.
Published: (2011) -
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006) -
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)