Key-Dependent S-box Scheme for Enhancing the Security of Block Ciphers
暂无分享,去创建一个
[1] Ramlan Mahmod,et al. A proposal for improving AES S-box with rotation and key-dependent , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[2] Carlisle M. Adams,et al. Key-Dependent S-Box Manipulations , 1998, Selected Areas in Cryptography.
[3] Prabhas Chongstitvatana,et al. AES implementation for RFID Tags: The hardware and software approaches , 2014, 2014 International Computer Science and Engineering Conference (ICSEC).
[4] Rasha Subhi Ali,et al. Enhancement CAST block algorithm to encrypt big data , 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT).
[6] Yansheng Li,et al. Performance Evaluation for CAST and RC5 Encryption Algorithms , 2010, 2010 International Conference on Computing, Control and Industrial Engineering.
[7] K. B. Jithendra,et al. New Results in Related Key Impossible Differential Cryptanalysis on Reduced Round AES-192 , 2018, 2018 International Conference On Advances in Communication and Computing Technology (ICACCT).
[8] Baodian Wei,et al. An AES S-box to increase complexity and cryptographic analysis , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[9] Krerk Piromsopa,et al. An implementation of AES-128 and AES-512 on Apple mobile processor , 2017, 2017 14th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).
[10] Shraphalya B. Nalawade,et al. Design and implementation of blowfish algorithm using reconfigurable platform , 2017, 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE).
[11] Hongqi Zhang,et al. Study of the AES Realization Method on the Reconfigurable Hardware , 2013, 2013 International Conference on Computer Sciences and Applications.