The 256/384/512-bit version of the Rijndael block cipher (original) (raw)

Profile image of Dương ĐứcDương Đức

2012, Journal of Computer Science and Cybernetics

visibility

description

12 pages

link

1 file

Sign up for access to the world's latest research.

checkGet notified about relevant papers

checkSave papers to use in your research

checkJoin the discussion with peers

checkTrack your impact

New Block Cipher: ARIA

Yongjin Yeom

Information Security and Cryptology - ICISC 2003, 2004

View PDFchevron_right

On the Security and Performance of the FDE Block Cipher

Faramarz Hendessi

2009

View PDFchevron_right

Requirements for symmetric block encryption algorithms developed for software and hardware implementation

Kairat Sakan

Journal of Mathematics, Mechanics and Computer Science, 2021

View PDFchevron_right

A survey of encryption standards

Ghulam Ali

Micro, IEEE, 1993

View PDFchevron_right

Hardware-Dedicated Stream Ciphers

Benjamin Gittins

2009

View PDFchevron_right

Introduction of a Triple Prime Symmetric Key Block Cipher

Angshu Sinha

International Journal of Computer Applications, 2012

View PDFchevron_right

HANDBOOK of APPLIED CRYPTOGRAPHY

Guilherme Morais

View PDFchevron_right

Int. J. Sci. Res. in Network Security and Communication

Dr. Shivlal Mewada

View PDFchevron_right

D016411823

IOSR Journals

View PDFchevron_right

Article Text 2336 2 10 20241013 (1)

Dr-Bayad J Jaza Mahmud

View PDFchevron_right

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

Physical Layer Error Correction Based Cipher

Murali Varanasi

2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010

View PDFchevron_right

S41748 024 00464 3 (2)

Robert Bryant

View PDFchevron_right

Triple SV: A Bit Level Symmetric Block-Cipher Having High Avalanche Effect

Dr. Rajdeep Chakraborty

International Journal of Advanced Computer Science and Applications, 2011

View PDFchevron_right

Stream Cipher with Space-Time Block Code

Hanaa M Ahmed

International Journal of Computing and Information Sciences, 2016

View PDFchevron_right

Article Text 615 2 10 20240731 (1)

Ashu saini

View PDFchevron_right

Science of Cryptogrraphy

Bernadette Macdonald

View PDFchevron_right

Cryptanalysis of Some AES-based Cryptographic Primitives

Riham AlTawy

2016

View PDFchevron_right

Cryptography: A Review

Dr. Amosa Babalola

2021

View PDFchevron_right

INTUITIVE COMPUTING METHODS AND SYSTEMS

bruce davis

US20210112154A

View PDFchevron_right

30i15 Ijaet0715549 V6 Iss3 1283to1298

IJAET Journal

View PDFchevron_right

A Survey on RC4 Stream Cipher

poonam jindal

International Journal of Computer Network and Information Security, 2015

View PDFchevron_right

IJISRT24JUL

Adeniyi Olalere

View PDFchevron_right

White-box Implementation of Stream Cipher

Shinsaku Kiyomoto

2017

View PDFchevron_right

Volume 14, Number 7, July 2024 (Serial Number 124)

US-China Education Review A & B

View PDFchevron_right

Article Text 1371 1 10 20240218 (1)

sajid ali

View PDFchevron_right

S2.0 S0032386121003542 main(1)

Anthony N Papathanassiou

View PDFchevron_right

Eur J Nucl Med 2000 Pauwels reply

Ulderico Mazzi

View PDFchevron_right

Cryptanalysis of Stream Cipher COS (2, 128) Mode I

kent ridge

Lecture Notes in Computer Science, 2002

View PDFchevron_right

<10.1016/J.AGEE.2015.02.001>. <HAL-01129938V1&GT

Daniel Muller-Nedebock

2015

View PDFchevron_right

S2.0 S0925753522001291 main (1)

Li Rita

View PDFchevron_right

S11250 024 04017 8 (1)

ÇAĞRI Ö Z G Ü R ÖZKAN

View PDFchevron_right

B6F72580 (1)

Amungwa Ivan

View PDFchevron_right

A New Cryptographic Algorithm for the Real-Time Applications

Rafa Al-Qutaish

2008

View PDFchevron_right

A comparative study of hardware architectures for lightweight block ciphers

Paris Kitsos

Computers & Electrical Engineering, 2012

View PDFchevron_right

Advances in Cryptology - ASIACRYPT’99

Paul Leyland

Springer eBooks, 1999

View PDFchevron_right

Computer Science