메뉴 건너뛰기




Volumn 10, Issue 18, 2010, Pages 2161-2167

An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael

Author keywords

Advance encrypting standard; Cryptography; Mathematical preliminaries

Indexed keywords

DIGITAL STORAGE; MULTIMEDIA SYSTEMS;

EID: 77954833269     PISSN: 18125654     EISSN: 18125662     Source Type: Journal    
DOI: 10.3923/jas.2010.2161.2167     Document Type: Article
Times cited : (16)

References (13)
  • 2
    • 77954783799 scopus 로고    scopus 로고
    • New framework for high secure data hidden in the MPEG using AES encryption algorithm
    • Alaa, T., A.A. Zaidan and B.B. Zaidan, 2009. New framework for high secure data hidden in the MPEG using AES encryption algorithm. Int. J. Comput. Electr. Eng., 1: 566-571.
    • (2009) Int. J. Comput. Electr. Eng. , vol.1 , pp. 566-571
    • Alaa, T.1    Zaidan, A.A.2    Zaidan, B.B.3
  • 4
    • 77958532276 scopus 로고    scopus 로고
    • Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard
    • Naji, A.W., A.A. Zaidan, B.B. Zaidan and I.A.S. Muhamadi, 2009a. Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard. Proc. World Acad. Sci. Eng. Technol, 56: 498-502.
    • (2009) Proc. World Acad. Sci. Eng. Technol. , vol.56 , pp. 498-502
    • Naji, A.W.1    Zaidan, A.A.2    Zaidan, B.B.3    Muhamadi, I.A.S.4
  • 5
    • 77952268534 scopus 로고    scopus 로고
    • Challenges of hidden data in the unused area two within executable files
    • Naji, A.W., A.A. Zaidan and B.B. Zaidan, 2009b. Challenges of hidden data in the unused area two within executable files. J. Comput. Sci., 5: 890-897.
    • (2009) J. Comput. Sci. , vol.5 , pp. 890-897
    • Naji, A.W.1    Zaidan, A.A.2    Zaidan, B.B.3
  • 6
    • 77954769007 scopus 로고    scopus 로고
    • Theory and implementation of data encryption standard:
    • Rabah, K., 2005a. Theory and implementation of data encryption standard: A review. Inform. Technol. J.,4: 307-325.
    • (2005) A Review. Inform. Technol. J. , vol.4 , pp. 307-325
    • Rabah, K.1
  • 7
    • 33644596644 scopus 로고    scopus 로고
    • Theory and implementation of elliptic curve cryptography
    • Rabah, K., 2005b. Theory and implementation of elliptic curve cryptography. J. Applied Sci., 5: 604-633.
    • (2005) J. Applied Sci. , vol.5 , pp. 604-633
    • Rabah, K.1
  • 8
    • 33646264791 scopus 로고    scopus 로고
    • Implementing secure RSA cryptosystems using your own cryptographic JCE provider
    • Rabah, K., 2006. Implementing secure RSA cryptosystems using your own cryptographic JCE provider. J. Applied Sci., 6: 482-510.
    • (2006) J. Applied Sci. , vol.6 , pp. 482-510
    • Rabah, K.1
  • 9
    • 84888281099 scopus 로고    scopus 로고
    • Theoretical Analysis of linear cryptanalysis against DES (Data Encryption Standard)
    • Xu, Q.Z. and Y. Dereje, 2004. Theoretical Analysis of linear cryptanalysis against DES (Data Encryption Standard). Inform. Technol. J., 3: 49-56.
    • (2004) Inform. Technol. J. , vol.3 , pp. 49-56
    • Xu, Q.Z.1    Dereje, Y.2
  • 10
    • 84888281933 scopus 로고    scopus 로고
    • High securing cover-file of hidden data using statistical technique and AES encryption algorithm
    • Zaidan, A.A., B.B. Zaidan and M. Anas, 2009a. High securing cover-file of hidden data using statistical technique and AES encryption algorithm. World Acad. Sci. Eng. Technol., 54: 468-479.
    • (2009) World Acad. Sci. Eng. Technol. , vol.54 , pp. 468-479
    • Zaidan, A.A.1    Zaidan, B.B.2    Anas, M.3
  • 11
    • 70449563262 scopus 로고    scopus 로고
    • Novel approach of hidden data in the unused area 1 within exe files using computation between cryptography and steganography
    • June 24-26, Academic and Scientific Research Organizations, Paris, France
    • Zaidan, B.B., A.A. Zaidan, F. Othman and A. Rahem, 2009b. Novel approach of hidden data in the unused area 1 within exe files using computation between cryptography and steganography. Proceedings of the International Conference on Cryptography Coding and Information Security, June 24-26, Academic and Scientific Research Organizations, Paris, France, pp: 1-22.
    • (2009) Proceedings of the International Conference on Cryptography Coding and Information Security , pp. 1-22
    • Zaidan, B.B.1    Zaidan, A.A.2    Othman, F.3    Rahem, A.4
  • 12
    • 84888276035 scopus 로고    scopus 로고
    • A new system for hiding data within (Unused Area Two + Image Page) of portable executable file using statistical technique and advance encryption standard
    • Zaidan, A.A., B.B. Zaidan and A.H. Jalab, 2010a. A new system for hiding data within (Unused Area Two + Image Page) of portable executable file using statistical technique and advance encryption standard. Int. J. Comput. Theory Eng., 2: 220-227.
    • (2010) Int. J. Comput. Theory Eng. , vol.2 , pp. 220-227
    • Zaidan, A.A.1    Zaidan, B.B.2    Jalab, A.H.3
  • 13
    • 77954783981 scopus 로고    scopus 로고
    • On the differences between hiding information and cryptography techniques: An overview
    • Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010b. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
    • (2010) J. Applied Sci. , vol.10 , pp. 1650-1655
    • Zaidan, B.B.1    Zaidan, A.A.2    Al-Frajat, A.K.3    Jalab, H.A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.