29
Views
6
CrossRef citations to date
0
Altmetric
Articles

Variation and security enhancement of block ciphers by embedding

, &

References

  • Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press LLC (1997).
  • Shannon, Claude. Communication Theory of Secrecy Systems. Bell System Technical Journal. 28 (4): 656715 (1949). doi: 10.1002/j.1538-7305.1949.tb00928.x
  • Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen and Axel Poschmann. AES Variants Secure Against Related-Key Differential and Boomerang Attacks. IFIP International Workshop on Information Security Theory and Practices, WISTP 2011: Information Security Theory and Practice. Securityand Privacy of Mobile Devices in Wireless Communication pp 191-207. LNCS, volume 6633.
  • Sumira Hameed1, Faisal Riaz2, Riaz Moghal3, Gulraiz Akhtar4, Anil Ahmed Abdul Ghafoor Dar. Modified Advanced Encryption Standard For Text And Images. Computer Science Journal Volume 1, Issue 3, pp. 120-129 (December 2011).
  • Puneet Kumar, Shashi B. Rana. Development of modified AES algorithm for data security.vwww.elsevier.de/ijleo Optik 127 (2016) 23412345
  • M. Navaneetha Krishnan and R. Ravi. Modified AES with random S-box generation to overcome the side channel assaults using cloud. ICTACT J. on Soft Computing, vol. 07, issue 02, pp.1373-1380 (January 2017) doi: 10.21917/ijsc.2017.0190
  • Daemen Joan, Rijmen Vincent. AES Proposal. National Institute of Standards and Technology, USA. https://en.wikipedia.org/wiki/Advanced Encryption Standard
  • Gundala Swathi, Secure data storage in cloud computing to avoiding some ciphertext attack, Journal of Information and Optimization Sciences, 39:4, 843-855, (2018) DOI: 10.1080/02522667.2016.1231966

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.