Key-dependent Advanced Encryption Standard
暂无分享,去创建一个
[1] Christophe Clavier,et al. Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks , 2014, Cryptography and Communications.
[2] Prerna Mahajan,et al. A Study of Encryption Algorithms AES, DES and RSA for Security , 2013 .
[3] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[4] N KrishnamurthyG,et al. Making AES Stronger: AES with Key Dependent S-Box , 2008 .
[5] Ritu Vijay,et al. An implementation and performance evaluation of an improved chaotic image encryption approach , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[6] Ritu Vijay,et al. An AES–CHAOS-Based Hybrid Approach to Encrypt Multiple Images , 2017 .
[7] Abdelrahman Altigani,et al. Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations , 2016 .
[8] H.A.M. Luiijf,et al. National Cyber Security Framework Manual , 2013 .
[9] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[10] Kazys Kazlauskas,et al. Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.
[11] Abdelrahman Altigani,et al. A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and Word Shift Coding Protocol , 2013, 2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE).
[12] Shashi B. Rana,et al. Development of modified AES algorithm for data security , 2016 .
[13] Nisha Nisha,et al. A Hybrid Approach of AES and File Encryption to Enhance The Cloud Security , 2015 .
[14] Mahamod Ismail,et al. Enhancement of AES algorithm based on chaotic maps and shift operation for image encryption , 2015 .