1
by Sulong, Mek Rahmah
Published 2008
...Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen in 1999. It is a combination...
View full text
Thesis
2
...The aim of the study is to improve the security of Rijndael key scheduling by increasing the bit...
View full text
Article
3
...The key schedule function in Rijndael block cipher did not receive the same amount of attention...
Conference or Workshop Item
4
by Sulong, Mek Rahmah
Published 2008
...Rijndael is a block cipher designed by Joan Daemen and Vincent Rijmen in 1999. It is a combination...
View full text
Thesis
5
View full text
Thesis Book
6
... is Rijndael which adopted by the National Institute of Standards and Technology (NIST), USA in 2001...
View full text
Thesis
7
... of attacks especially in relatedkey model attacks. These days, the most common block cipher is Rijndael which...
View full text
Thesis
8
Thesis Book
9
.... This is the result of a combination of strong key and the structure of the block cipher. Rijndael, currently...
View full text
Article
10
... to various forms of attacks, especially in related-key model attacks. Rijndael is the most common...
View full text
Article
11
by Mohd Ali, Fakariah Hani
Published 2004
... system including the newly developed Rijndael the Advanced Encryption Standard (AES). This encryption...
View full text
Thesis
12
by Mohd Ali, Fakariah Hani
Published 2004
... system including the newly developed Rijndael the Advanced Encryption Standard (AES). This encryption...
View full text
Thesis
13
... protocols, etc. These days the most common block cipher is the AES Rijndael, which is used as a standard...
View full text
Conference or Workshop Item
14
... system including the newly developed Rijndael the Advanced Encryption Standard (AES). This encryption...
View full text
Article
16
...The algebraic expression of the Advanced Encryption Standard (AES) RIJNDAEL S-box involved only 9...
View full text
Article
17
Published 2005
Table of Contents: ... and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael...
View full text
Electronic eBook
18
... technique by examining the security of Rijndael block cipher in RDC attack. We prove this technique through...
View full text
Article
19
Table of Contents: ..., Assignment, Conversion -- Dynamic Registers -- Basic Number-Theoretic Functions -- Rijndael: A Successor...
View full text
Electronic eBook
20
View full text
Electronic eBook