Modified AES Cipher Round and Key Schedule
暂无分享,去创建一个
[1] Ken Choi,et al. Power dissipation and area comparison of 512-bit and 1024-bit key AES , 2013, Comput. Math. Appl..
[2] B. R. Pushpa,et al. Enhanced cloud data security using AES algorithm , 2017, 2017 International Conference on Intelligent Computing and Control (I2C2).
[3] Retantyo Wardoyo,et al. Review of Image Compression and Encryption Techniques , 2017 .
[4] Ariel M. Sison,et al. Modified Blowfish Algorithm , 2018 .
[5] Elshazly Emad,et al. A secure image steganography algorithm based on least significant bit and integer wavelet transform , 2018 .
[6] Anamika Rangra,et al. A Review on DES, AES and Blowfish for Image Encryption & Decryption , 2015 .
[7] Ariel M. Sison,et al. Modified AES for Text and Image Encryption , 2018 .
[8] Tao Wang,et al. Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations , 2014, IEEE Transactions on Information Forensics and Security.
[9] Priyadarshini Patila,et al. A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .
[10] Prashant Dwivedy,et al. Comparative study of AES, RSA, genetic, affine transform with XOR operation, and watermarking for image encryption , 2017, 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE).
[11] Hae-Yeoun Lee,et al. Deep Learning-Based Steganalysis Against Spatial Domain Steganography , 2017, 2017 European Conference on Electrical Engineering and Computer Science (EECS).
[12] Mohamed Waleed Fakhr,et al. Joint image compression and encryption based on compressed sensing and entropy coding , 2017, 2017 IEEE 13th International Colloquium on Signal Processing & its Applications (CSPA).
[13] Manoj Kumar,et al. A wavelet based approach for simultaneous compression and encryption of fused images , 2017, J. King Saud Univ. Comput. Inf. Sci..
[14] Zaiton Muda,et al. Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits , 2017 .
[15] Hoang Duc Tho,et al. On the improving diffusion layer and performance of AES algorithm , 2017, 2017 International Conference on Information and Communications (ICIC).
[16] Zafar Shahid,et al. Denoising and error correction in noisy AES-encrypted images using statistical measures , 2016, Signal Process. Image Commun..
[17] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[18] Petr Socha,et al. Attacking AES implementations using correlation power analysis on ZYBO Zynq-7000 SoC board , 2018, 2018 7th Mediterranean Conference on Embedded Computing (MECO).
[19] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[20] Jialin Huang,et al. Transposition of AES Key Schedule , 2016, Inscrypt.
[21] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[22] Weiming Zhang,et al. Ensemble Steganography , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[23] Eiji Okamoto,et al. A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl , 2017, J. Parallel Distributed Comput..