-
1
-
-
49149096383
-
A real time sbox construction using arithmetic modulo prime numbers
-
Abuelyman, E.S. and M.A. El-Affendi, 2007. A real time sbox construction using arithmetic modulo prime numbers. J. Digital Inform. Manage., 5: 354-260. http://www.dirf.org/jdim/v5i60a2.pdf.
-
(2007)
J. Digital Inform. Manage.
, vol.5
, pp. 260-354
-
-
Abuelyman, E.S.1
El-Affendi, M.A.2
-
2
-
-
62849101473
-
Encryption-compression of images based on FMT and AES algorithm
-
Benabdellah, M., M.M. Himmi, N. Zahid, F. Regragui and E.H. Bouyakhf, 2007. Encryption- compression of images based on FMT and AES algorithm. Applied Math. Sci., 1: 2203-2219. http://www.m-hikari.com/ams/ams-password-2007/ams- password45-48-2007/benabdellahAMS45-48-2007.pdf.
-
(2007)
Applied Math. Sci.
, vol.1
, pp. 2203-2219
-
-
Benabdellah, M.1
Himmi, M.M.2
Zahid, N.3
Regragui, F.4
Bouyakhf, E.H.5
-
3
-
-
33745642130
-
Related key impossible differential attacks on 8-round AES-192
-
Biham, E., O. Dunkelman and N. Keller, 2006. Related key impossible differential attacks on 8-round AES- 192. Lecture Notes Comput. Sci., 3860: 21-33. http://www.springerlink.com/content/p804p313030l1680/.
-
(2006)
Lecture Notes Comput. Sci.
, vol.3860
, pp. 21-33
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
4
-
-
38349175104
-
A novel heuristic method for obtaining S-boxes
-
DOI: 10.1016/j.chaos.2006.08.003
-
Chen, G., 2008. A novel heuristic method for obtaining S-boxes. Chaos Solit. Fract., 36: 1028-1036. DOI: 10.1016/j.chaos.2006.08.003.
-
(2008)
Chaos Solit. Fract.
, vol.36
, pp. 1028-1036
-
-
Chen, G.1
-
6
-
-
78049347771
-
The extended rijndael-like block ciphers
-
Apr. 8-10, IEEE Xpolre, USA., DOI: 10.1109/ITCC.2002.1000384
-
Duc, D.A., T.M. Triet and L.H. Co, 2002. The extended rijndael-like block ciphers. Proceeding of the International Conference on Information Technology, Coding and Computing, Apr. 8-10, IEEE Xpolre, USA., pp: 183-188. DOI: 10.1109/ITCC.2002.1000384.
-
(2002)
Proceeding of the International Conference on Information Technology, Coding and Computing
, pp. 183-188
-
-
Duc, D.A.1
Triet, T.M.2
Co, L.H.3
-
7
-
-
62749096566
-
Quality of encryption measurement of bitmap images with RC6, MRC6 and rijndael block cipher algorithms
-
El-Fishawy, N. and O.M. Abu Zaid, 2007. Quality of encryption measurement of bitmap images with RC6, MRC6 and rijndael block cipher algorithms. Int. J. Network Secur., 5: 241-251. http://cmpe.emu.edu.tr/chefranov/cmpe553-07-Spring/ Notes/ijns-2007-v5-n3-p241-251.pdf.
-
(2007)
Int. J. Network Secur.
, vol.5
, pp. 241-251
-
-
El-Fishawy, N.1
Zaid, O.M.A.2
-
8
-
-
24944480579
-
Related-key differential cryptanalysis of 192-bit key AES variants
-
3006
-
Jakimoski, G. and Y. Desmedt, 2004. Related-key differential cryptanalysis of 192-bit key AES variants. Lecture Notes Comput. Sci., 3006: 208-221. http://www.springerlink.com/content/8gnbt35440jx683y/.
-
(2004)
Lecture Notes Comput. Sci.
, pp. 208-221
-
-
Jakimoski, G.1
Desmedt, Y.2
-
9
-
-
2342549695
-
Fast implementation of AES cryptographic algorithms in smart cards
-
Oct. 14-16, IEEE Xpolre, USA., DOI: 10.1109/CCST.2003.1297622
-
Lu, C.F., Y.S. Kao, H.L. Chiang and C.H. Yang, 2004. Fast implementation of AES cryptographic algorithms in smart cards. Proceeding of the IEEE 37th Annual International Carnahan Conference on Security Technololgy, Oct. 14-16, IEEE Xpolre, USA., pp: 573-579. DOI: 10.1109/CCST.2003.1297622.
-
(2004)
Proceeding of the IEEE 37th Annual International Carnahan Conference on Security Technololgy
, pp. 573-579
-
-
Lu, C.F.1
Kao, Y.S.2
Chiang, H.L.3
Yang, C.H.4
-
10
-
-
21844458984
-
An asymmetric image encryption based on matrix transformation
-
Oct. 26-29, IEEE Xpolre, USA., DOI: 10.1109/ISCIT.2004.1412451
-
Shuangyuan, Y., L. Zhengding and H. Shuihua, 2004. An asymmetric image encryption based on matrix transformation. Proceeding of the IEEE International Symposium on Communications and Information Technology, Oct. 26-29, IEEE Xpolre, USA., pp: 66-69. DOI: 10.1109/ISCIT.2004.1412451.
-
(2004)
Proceeding of the IEEE International Symposium on Communications and Information Technology
, pp. 66-69
-
-
Shuangyuan, Y.1
Zhengding, L.2
Shuihua, H.3
-
11
-
-
67649185123
-
An asymmetric image encryption based on matrix transformation
-
Shuihua, H. and Y. Shuangyuan, 2005. An asymmetric image encryption based on matrix transformation. ECTI Trans.Comp. Inform. Technol., 1:12.
-
(2005)
ECTI Trans.Comp. Inform. Technol.
, vol.1
, pp. 12
-
-
Shuihua, H.1
Shuangyuan, Y.2
-
12
-
-
51949092251
-
A modified AES based algorithm for image encryption
-
Zeghid, M., M. Machhout, L. Khriji, A. Baganne and R. Tourki, 2007. A modified AES based algorithm for image encryption. Int. J. Comp. Sci. Eng., 1: 70-75. http://www.waset.org/ijcse/v1/v1-1-9.pdf\.
-
(2007)
Int. J. Comp. Sci. Eng.
, vol.1
, pp. 70-75
-
-
Zeghid, M.1
Machhout, M.2
Khriji, L.3
Baganne, A.4
Tourki, R.5
-
13
-
-
62849085933
-
A modified AES based algorithm for image encryption
-
Zeghid, M., M. Machhout, L. Khriji, A. Baganne and R. Tourki, 2007. A modified AES based algorithm for image encryption. Proceeding of the World Academy of Science, Engineering and Technololgy, http://www.waset.org/pwaset/ v21/v21-37.pdf.
-
(2007)
Proceeding of the World Academy of Science, Engineering and Technololgy
-
-
Zeghid, M.1
Machhout, M.2
Khriji, L.3
Baganne, A.4
Tourki, R.5
-
14
-
-
37349103020
-
Related-key impossible differential attacks on reduced-round AES-256
-
Zhang, W.T., W.L. Wu and L. Zhang, 2007. Related-key impossible differential attacks on reduced-round AES-256. J. Software, 18: 2893-2901. http://www.lois.cn/LOIS-AES/data/AES-256.pd.
-
(2007)
J. Software
, vol.18
, pp. 2893-2901
-
-
Zhang, W.T.1
Wu, W.L.2
Zhang, L.3
|