Key Transformation Approach for Rijndael Security
Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen in 1999. It is a combination of security, performance, efficiency, implementability and flexibility that makes it the best selection for Advanced Encryption Standard (AES). However, the 128- bit Rijndael Key Schedule does not s...
| Auteur principal: | Sulong, Mek Rahmah |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2008
|
| Sujets: | |
| Accès en ligne: | http://psasir.upm.edu.my/id/eprint/5895/1/FSKTM_2008_3%20IR.pdf |
Documents similaires
Improved security of Rijndael key expansion function
par: Hussien, Al-Abadi Hassan Mansur
Publié: (2017)
par: Hussien, Al-Abadi Hassan Mansur
Publié: (2017)
Secret sharing scheme for key management of secure data sharing in cloud
par: Abd Majid, Noorhafezan
Publié: (2019)
par: Abd Majid, Noorhafezan
Publié: (2019)
A modified approach to improve the performance of AES using feistel structure
par: Al-Ansi, Afeef Yahya Ahmed
Publié: (2018)
par: Al-Ansi, Afeef Yahya Ahmed
Publié: (2018)
Security Study and Encryption / Decryption Method
par: Al-Qdah, Majdi Taysir
Publié: (2000)
par: Al-Qdah, Majdi Taysir
Publié: (2000)
Development of DNA-based dynamic key-dependent block cipher
par: Saeed, Auday H.
Publié: (2015)
par: Saeed, Auday H.
Publié: (2015)
Development of authentication code based on spectral amplitude coding optical code division multiplexing for multi-user pseudo quantum key distribution
par: Abiola, Taiwo Ambali
Publié: (2018)
par: Abiola, Taiwo Ambali
Publié: (2018)
Design of robust and fragile image watermarking system for copyright protection and authentication using lifting wavelet transform and bivariate empirical mode decomposition techniques
par: Abbas, Nidaa Hasan
Publié: (2017)
par: Abbas, Nidaa Hasan
Publié: (2017)
Hybrid cryptography algorithm to improve security cloud storage
par: Abd Almohsen, Inam Razzaq
Publié: (2017)
par: Abd Almohsen, Inam Razzaq
Publié: (2017)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
par: Abdulbari Ali, Sherif
Publié: (2005)
par: Abdulbari Ali, Sherif
Publié: (2005)
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
par: Rezaeipour, Davood
Publié: (2011)
par: Rezaeipour, Davood
Publié: (2011)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
par: Jamal, Fara
Publié: (2021)
par: Jamal, Fara
Publié: (2021)
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
par: Shereek, Balkees Mohamed
Publié: (2016)
par: Shereek, Balkees Mohamed
Publié: (2016)
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
par: Ahmed, Shakil
Publié: (2013)
par: Ahmed, Shakil
Publié: (2013)
Encryption selection for WLAN IEEE802.11G
par: Ahmad, Zahrol Azam
Publié: (2013)
par: Ahmad, Zahrol Azam
Publié: (2013)
Enhancing performance of XTS cryptography mode of operation using parallel design
par: Ahmed Alomari, Mohammad
Publié: (2009)
par: Ahmed Alomari, Mohammad
Publié: (2009)
Effects of variation theory-based strategy on form two students' algebraic achievement and motivation
par: Ting, Jing Jing
Publié: (2016)
par: Ting, Jing Jing
Publié: (2016)
Performance analysis and improvement of rabin primitive based cryptosystems
par: Mahad, Zahari
Publié: (2014)
par: Mahad, Zahari
Publié: (2014)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
par: Sulaiman, Saniah
Publié: (2019)
par: Sulaiman, Saniah
Publié: (2019)
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
par: Hussein Fayiz, Mohammad Al-Khatib
Publié: (2012)
par: Hussein Fayiz, Mohammad Al-Khatib
Publié: (2012)
Dynamic determinant matrix-based block cipher algorithm
par: Juremi, Julia
Publié: (2018)
par: Juremi, Julia
Publié: (2018)
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
par: Md Yasin, Sharifah
Publié: (2011)
par: Md Yasin, Sharifah
Publié: (2011)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
par: Roslan, Nuur Alifah
Publié: (2011)
par: Roslan, Nuur Alifah
Publié: (2011)
Implementation of data security system in Tabung Haji and SOCSO
par: Ahmad, Jasmin Ilyani
Publié: (2003)
par: Ahmad, Jasmin Ilyani
Publié: (2003)
New compendium of RSA vulnerabilities
par: Abd Ghafar, Amir Hamzah
Publié: (2020)
par: Abd Ghafar, Amir Hamzah
Publié: (2020)
Multimodal fingerprint and face biometrics with fragile watermarking and convolutional neural network
par: Najih, Abdulmawla
Publié: (2020)
par: Najih, Abdulmawla
Publié: (2020)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
par: Mohd Satar, Siti Dhalila
Publié: (2023)
par: Mohd Satar, Siti Dhalila
Publié: (2023)
Analysis and improvement of S-Box in Rijndael- AES algorithm
par: Gaithuru, Juliet Nyokabi
Publié: (2013)
par: Gaithuru, Juliet Nyokabi
Publié: (2013)
Enhanced normalization approach to address stop-word complexity in compound-word schema labels
par: Hossain, Jafreen
Publié: (2014)
par: Hossain, Jafreen
Publié: (2014)
Analyses of key management techniques for secure patient monitoring in wireless sensor network environment
par: Majidi, Mojib
Publié: (2010)
par: Majidi, Mojib
Publié: (2010)
Source code analysis extractive approach to generate textual summary
par: Dawood, Kareem Abbas
Publié: (2017)
par: Dawood, Kareem Abbas
Publié: (2017)
Design of Data Transceiver Using Differential Quaternary Phase Shift Keying (DQPSK) Modulation Technique
par: Chuah, Khar Yee
Publié: (1996)
par: Chuah, Khar Yee
Publié: (1996)
Secure pairing-free two-party certificateless authenticated key agreement protocol with minimal computational complexity
par: Ghoreishi, Seyedmohsen
Publié: (2019)
par: Ghoreishi, Seyedmohsen
Publié: (2019)
Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol / Hero Modares
par: Modares, Hero
Publié: (2013)
par: Modares, Hero
Publié: (2013)
A lightweight key management framework for secure dynamic group based applications / Salman Iqbal Malik
par: Salman Iqbal , Malik
Publié: (2017)
par: Salman Iqbal , Malik
Publié: (2017)
Multicast-unicast key management and data delivery method in wireless IPv6 networks
par: Zare Anari, Abbas Mehdizadeh
Publié: (2012)
par: Zare Anari, Abbas Mehdizadeh
Publié: (2012)
Data filtering framework for preserving meaningful data records from streams of unstructured weather data
par: Al-Zyadat, Wa'el Jum'ah
Publié: (2014)
par: Al-Zyadat, Wa'el Jum'ah
Publié: (2014)
Information security policy compliance model for government agency
par: Ramli, Muhamad Amirnazmi
Publié: (2018)
par: Ramli, Muhamad Amirnazmi
Publié: (2018)
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
par: Mohd Ali, Fakariah Hani
Publié: (2004)
par: Mohd Ali, Fakariah Hani
Publié: (2004)
Unstructured big data processing in cloud computing environment by using Amazon Elastic Map Reduce
par: Busu, Norzaharawani
Publié: (2017)
par: Busu, Norzaharawani
Publié: (2017)
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
par: Thabit, Reema Ahmed Abdalla
Publié: (2022)
par: Thabit, Reema Ahmed Abdalla
Publié: (2022)
Documents similaires
-
Improved security of Rijndael key expansion function
par: Hussien, Al-Abadi Hassan Mansur
Publié: (2017) -
Secret sharing scheme for key management of secure data sharing in cloud
par: Abd Majid, Noorhafezan
Publié: (2019) -
A modified approach to improve the performance of AES using feistel structure
par: Al-Ansi, Afeef Yahya Ahmed
Publié: (2018) -
Security Study and Encryption / Decryption Method
par: Al-Qdah, Majdi Taysir
Publié: (2000) -
Development of DNA-based dynamic key-dependent block cipher
par: Saeed, Auday H.
Publié: (2015)