References
- Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press LLC (1997).
- Shannon, Claude. Communication Theory of Secrecy Systems. Bell System Technical Journal. 28 (4): 656715 (1949). doi: 10.1002/j.1538-7305.1949.tb00928.x
- Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen and Axel Poschmann. AES Variants Secure Against Related-Key Differential and Boomerang Attacks. IFIP International Workshop on Information Security Theory and Practices, WISTP 2011: Information Security Theory and Practice. Securityand Privacy of Mobile Devices in Wireless Communication pp 191-207. LNCS, volume 6633.
- Sumira Hameed1, Faisal Riaz2, Riaz Moghal3, Gulraiz Akhtar4, Anil Ahmed Abdul Ghafoor Dar. Modified Advanced Encryption Standard For Text And Images. Computer Science Journal Volume 1, Issue 3, pp. 120-129 (December 2011).
- Puneet Kumar, Shashi B. Rana. Development of modified AES algorithm for data security.vwww.elsevier.de/ijleo Optik 127 (2016) 23412345
- M. Navaneetha Krishnan and R. Ravi. Modified AES with random S-box generation to overcome the side channel assaults using cloud. ICTACT J. on Soft Computing, vol. 07, issue 02, pp.1373-1380 (January 2017) doi: 10.21917/ijsc.2017.0190
- Daemen Joan, Rijmen Vincent. AES Proposal. National Institute of Standards and Technology, USA. https://en.wikipedia.org/wiki/Advanced Encryption Standard
- Gundala Swathi, Secure data storage in cloud computing to avoiding some ciphertext attack, Journal of Information and Optimization Sciences, 39:4, 843-855, (2018) DOI: 10.1080/02522667.2016.1231966