A Modified Generation of S-Box for Advanced Encryption Standards
暂无分享,去创建一个
[1] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[2] Vinay Chopra,et al. Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman , 2017 .
[3] Mary James,et al. An Implementation of Modified Lightweight Advanced Encryption Standard in FPGA , 2016 .
[4] Faisal Riaz,et al. Modified Advanced Encryption Standard For Text And Images , 2012 .
[5] Zahraddeen Abubakar Pindar,et al. A Survey on the Cryptographic Encryption Algorithms , 2017 .
[6] Jaime David Rios Arrañaga,et al. New S-box calculation approach for Rijndael-AES based on an artificial neural network , 2017, RECIBE, REVISTA ELECTRÓNICA DE COMPUTACIÓN, INFORMÁTICA, BIOMÉDICA Y ELECTRÓNICA.
[7] Monisha Sharma,et al. Implementation and analysis of various symmetric cryptosystems , 2010 .
[8] A. Tarter. Importance of Cyber Security , 2017 .
[9] Chandra Prakash Dewangan,et al. A Novel Approach to Improve Avalanche Effect of AES Algorithm , 2012 .
[10] Aizul Nahar Harun,et al. Developing building information modelling (BIM) implementation model for project design team , 2017 .
[11] Shailja Kumari,et al. Comparative Analysis on Different Parameters of Encryption Algorithms for Information Security , 2015 .
[12] Rajesh Kumar Goutam. Importance of Cyber Security , 2015 .
[13] Abdennaceur Kachouri,et al. Chaos-based designing of a highly nonlinear S-box using Boolean functions , 2015, 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15).
[14] Marione Ver C. Suana. Enhancement of Advanced Encryption Standard (AES) Cryptographic Strength via Generation of Cipher Key-Dependent S-Box , 2018 .
[15] Priyadarshini Patila,et al. A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .
[16] R Kiran Kumar,et al. A survey on conventional encryption algorithms of Cryptography , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).
[17] Meghna Vekariya,et al. Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms , 2015 .
[18] Priyadarshini Patil,et al. A Comprehensive Evaluation of Cryptographic Algorithms , 2016 .