Academic literature on the topic 'Rijndael'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Rijndael.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Rijndael"
Yeh, Yi-Shiung, and Ching-Hung Hsu. "A homophonic Rijndael." Journal of Information and Optimization Sciences 23, no. 1 (January 2002): 177–84. http://dx.doi.org/10.1080/02522667.2002.10699527.
Full textJamil, T. "The rijndael algorithm." IEEE Potentials 23, no. 2 (April 2004): 36–38. http://dx.doi.org/10.1109/mp.2004.1289996.
Full textFarisi, Ahmad. "Analisis Kinerja Algoritma Kriptografi Kandidat Advanced Encryption Standard (AES) pada Smartphone." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 4, no. 2 (March 18, 2018): 199–208. http://dx.doi.org/10.35957/jatisi.v4i2.103.
Full textMinier, Marine. "Improving impossible-differential attacks against Rijndael-160 and Rijndael-224." Designs, Codes and Cryptography 82, no. 1-2 (April 15, 2016): 117–29. http://dx.doi.org/10.1007/s10623-016-0206-7.
Full textWang, Qingju, Dawu Gu, Deniz Toz, Kerem Varici, and Zhiqiang Liu. "Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192." IET Information Security 9, no. 5 (September 1, 2015): 266–76. http://dx.doi.org/10.1049/iet-ifs.2014.0380.
Full textBakir, Bakir, and Hozairi Hozairi. "IMPLEMENTASI KRIPTOGRAFI PADA FILE ATTACHMENT EMAIL MENGGUNAKAN ALGORITMA RIJNDAEL." Jurnal Mnemonic 1, no. 2 (December 14, 2019): 75–81. http://dx.doi.org/10.36040/mnemonic.v1i2.42.
Full textAhmed, W. Eltayeb. "On Rijndael ByteSub Transformation." Applied Mathematics 10, no. 03 (2019): 113–18. http://dx.doi.org/10.4236/am.2019.103010.
Full textShiral, J. V., R. C. Deshmukh, J. S. Zade, and A. Potnurwar. "An Approach to Rijndael Algorithm." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 1 (January 31, 2015): 01–05. http://dx.doi.org/10.53555/nncse.v2i1.508.
Full textAde Chandra Saputra and Agus Sehatman Saragih. "RANCANG BANGUN WEBSITE BADAN PENGAWAS PEMILIHAN UMUM (BAWASLU) KALIMANTAN TENGAH." Jurnal Teknologi Informasi Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 13, no. 1 (October 30, 2019): 9–17. http://dx.doi.org/10.47111/jti.v13i1.279.
Full textZhang, Xin He, and Guan Nan Liu. "Study on AES and its Efficient Implementation on STM32F103 Processor." Applied Mechanics and Materials 397-400 (September 2013): 1828–32. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.1828.
Full textDissertations / Theses on the topic "Rijndael"
Pehlivanoglu, Serdar. "Rijndael Circuit Level Cryptanalysis." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-050505-121816/.
Full textKeywords: private-key cryptography; Advanced Encryption Standard; K-secure; hermetic; block cipher; circuit complexity. Includes bibliographical references (p. 75-79).
BARROS, Sergio Augusto Prazin de. "O Cripto-Sistema Rijndael." Universidade Federal de Pernambuco, 2003. https://repositorio.ufpe.br/handle/123456789/5536.
Full textCom a evolução da velocidade dos processadores modernos, usar cifras de bloco de comprimento 56 bits para a chave, como no Padrão de Cifragem de Dados (Data Encryption Standard DES), tornou-se menos seguro. Pensando neste sentido, foi feito um concurso, iniciado em 1998, pelo Instituto Nacional de Padrões e Tecnologia (National Institute of Standards and Technology NIST) do governo dos EUA para escolher um novo algoritmo criptográfico para substituir o antigo padrão. Em outubro de 2000 foi divulgado o resultado, o Rijndael tornou-se o Padrão Avançado de Cifragem (Advanced Encryption Standard AES). O AES é uma cifra de bloco iterativa cujo comprimento da chave é variável: 128, 192 ou 256 bits, operando sobre um bloco de 128 bits. Sua estrutura é baseada em transformações que utilizam a álgebra de corpos finitos, mais especificamente GF(256). Suas rodadas são seqüências de transformações provedoras dos requisitos básicos para uma cifra segura do ponto de vista criptográfico: confusão e difusão. Suas implementações nas mais diversas plataformas são velozes e ocupam pouca memória. Pode ser considerada uma cifra segura contra ataques de criptoanálise pois não existe nenhum ataque conhecido cujo desempenho seja melhor do que a busca exaustiva da chave. Esta dissertação é o resultado de um trabalho de pesquisa minucioso que revela de forma clara, mas sem excesso de rigores matemáticos, os detalhes do funcionamento, implementação, segurança e uso do Rijndael, servindo como instrumento para interessados na área de criptografia. Ele apresenta também uma implementação prática e didática da cifra, além da proposta e análise de uma função hash baseada no algoritmo
Banionis, Mindaugas. "Rijndael simetrinio šifravimo algoritmo tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_135849-39782.
Full textNowadays technologies are being improved rapidly – extremely fast dedicated servers, high internet and network throughput, enables more and more applications to be moved to a virtual space, which is called ‘Cloud computing’. Cloud computing is responsible that all shared computer resources, like Software, Hardware and Network would be allocated for services in optimal way. This feature enables to appear new services, like media streaming, documents editing online etc. This kind of services are based on ‘Thin client’ architecture, which is especially important for mobile devices. Main feature of this architecture is that applications which require many computations, now can be executed in dedicated servers and results can be displayed in mobile device screen. Fact, that aplication is not executed in mobile device environment decreases probability that important information will be infected by viruses, worms etc. However, between many existing problems with mobile devices there are two major which should be stated in the first place: energy consumption and information security. The first issue is due to inadequate progress of computational resources and battery energy power (e.g., CPU speed, memory capacity is being increased several times within a few years, while battery power doubles only in a decade). The second issue is closely related with the first one. Today people want to work anywhere, so there is abillity that mobile devices including important information could... [to full text]
Vaicekauskas, Gytis. "Rijndael šifravimo algoritmo realizavimas ir modifikavimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130807_145617-34991.
Full textIn this master thesis provided analysis of Rijndael chipher algorithm and realization examples, also proposed modification and then provided tests of chiphers that has been calculated using standard and modified algorithms.
Noroozi, Hamid. "Alternative Polynomials for Rijndael : Diffusion Analysis." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-36304.
Full textSever, Refik. "High Speed Vlsi Implementation Of The Rijndael Encryption Algorithm." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1124338/index.pdf.
Full textm standard CMOS process, 132 MHz worst-case clock speed is achieved yielding 2.41 Gbit/s non-pipelined throughput in both encryption and decryption. iii The design has a latency of 30 clock periods for key expansion that takes 228 ns for this implementation. A single encryption or decryption of a data block requires at most 44 clock periods. The area of the chip is 12.8 mm2 including the pads. 0.35-µ
m Standard Cell Libraries of the AMI Semiconductor Company are used in the implementation. The literature survey revealed that this implementation is the fastest published non-pipelined implementation for both encryption and decryption algorithms.
Kosaraju, Naga M. "A VLSI Architecture for Rijndael, the Advanced Encryption Standard." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000163.
Full textManteena, Rajender. "A VHDL implementation of the Advanced Encryption Standard-Rijndael Algorithm." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000296.
Full textManteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm." Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.
Full textOrgill, Gregory Leavitt. "Java Performance of the Rijndael Encryption Algorithm Across Compilers and Virtual Machines." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd681.pdf.
Full textBooks on the topic "Rijndael"
Daemen, Joan, and Vincent Rijmen. The Design of Rijndael. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-662-04722-4.
Full textDaemen, Joan, and Vincent Rijmen. The Design of Rijndael. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60769-5.
Full textVasu, E. Critical evalutiona of advanced encryption standard: Rijndael. London: University of East London, 2001.
Find full textDaemen, Joan, and Vincent Rijmen. The Design of Rijndael: The Advanced Encryption Standard. Springer, 2020.
Find full textThe Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer, 2002.
Find full textBook chapters on the topic "Rijndael"
Daemen, Joan, and Vincent Rijmen. "Rijndael." In Encyclopedia of Cryptography and Security, 1046–49. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_611.
Full textDaemen, Joan, and Vincent Rijmen. "Specification of Rijndael." In Information Security and Cryptography, 31–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-662-04722-4_3.
Full textDaemen, Joan, and Vincent Rijmen. "Specification of Rijndael." In Information Security and Cryptography, 31–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60769-5_3.
Full textMcLoone, Máire, and John V. McCanny. "Rijndael Architectures and Implementations." In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, 57–75. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0043-8_3.
Full textDaemen, Joan, and Vincent Rijmen. "The Block Cipher Rijndael." In Lecture Notes in Computer Science, 277–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10721064_26.
Full textDaemen, Joan, and Vincent Rijmen. "The Road to Rijndael." In Information Security and Cryptography, 169–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60769-5_11.
Full textRijmen, Vincent, and Elisabeth Oswald. "Representations and Rijndael Descriptions." In Advanced Encryption Standard – AES, 148–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506447_13.
Full textFerguson, Niels, John Kelsey, Stefan Lucks, Bruce Schneier, Mike Stay, David Wagner, and Doug Whiting. "Improved Cryptanalysis of Rijndael." In Fast Software Encryption, 213–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44706-7_15.
Full textWelschenbach, Michael. "Rijndael — Nachfolger für den DES." In Kryptographie in C und C++, 331–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56445-1_19.
Full textMasoumi, Massoud, Farshid Raissi, and Mahmoud Ahmadian. "NanoCMOS-Molecular Realization of Rijndael." In Lecture Notes in Computer Science, 285–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11894063_23.
Full textConference papers on the topic "Rijndael"
Zhang, Fangzhou, and Yingying Niu. "Rijndael Arithmetic Analyse and Optimize." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.1129.
Full textDamaj, Issam W. "Co-designs of parallel Rijndael." In 2011 International Symposium on System-on-Chip - SOC. IEEE, 2011. http://dx.doi.org/10.1109/issoc.2011.6089220.
Full textKokes, Josef, and Robert Lorencz. "Linear cryptanalysis of Baby Rijndael." In 2015 Forth International Conference on e-Technologies and Networks for Development (ICeND). IEEE, 2015. http://dx.doi.org/10.1109/icend.2015.7328533.
Full textSulaiman, Salasiah, Zaiton Muda, and Julia Juremi. "The new approach of Rijndael key schedule." In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2012. http://dx.doi.org/10.1109/cybersec.2012.6246100.
Full textNiu, Jiping. "Image Encryption Algorithm Based on Rijndael S-boxes." In 2008 International Conference on Computational Intelligence and Security. IEEE, 2008. http://dx.doi.org/10.1109/cis.2008.180.
Full textRazvi Doomun, M., K. M. Sunjiv Soyjaudah, and Devesh Bundhoo. "Energy consumption and computational analysis of rijndael-AES." In 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet. IEEE, 2007. http://dx.doi.org/10.1109/canet.2007.4401683.
Full textAlam, Monjur, Sonai Ray, Debdeep Mukhopadhayay, Santosh Ghosh, Dipanwita RoyChowdhury, and Indranil Sengupta. "An Area Optimized Reconfigurable Encryptor for AES-Rijndael." In Design, Automation & Test in Europe Conference. IEEE, 2007. http://dx.doi.org/10.1109/date.2007.364444.
Full textZainuddin, Zahir, and Evanita V. Manullang. "E-lerning concept design of rijndael encryption process." In 2013 IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE). IEEE, 2013. http://dx.doi.org/10.1109/tale.2013.6654535.
Full textYan, Chun, and Yanxia Guo. "A Research and Improvement Based on Rijndael Algorithm." In 2009 1st International Conference on Information Science and Engineering (ICISE 2009). IEEE, 2009. http://dx.doi.org/10.1109/icise.2009.148.
Full textAbdurohman, Maman, and Sarwono Sutikno. "DLX Processor Enhancement for AES Rijndael Crypto Algorithm." In TENCON 2006 - 2006 IEEE Region 10 Conference. IEEE, 2006. http://dx.doi.org/10.1109/tencon.2006.344093.
Full textReports on the topic "Rijndael"
Canright, D. A Very Compact Rijndael S-box. Fort Belvoir, VA: Defense Technical Information Center, May 2005. http://dx.doi.org/10.21236/ada434781.
Full text