Journal articles on the topic 'Rijndael'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Rijndael.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yeh, Yi-Shiung, and Ching-Hung Hsu. "A homophonic Rijndael." Journal of Information and Optimization Sciences 23, no. 1 (January 2002): 177–84. http://dx.doi.org/10.1080/02522667.2002.10699527.
Full textJamil, T. "The rijndael algorithm." IEEE Potentials 23, no. 2 (April 2004): 36–38. http://dx.doi.org/10.1109/mp.2004.1289996.
Full textFarisi, Ahmad. "Analisis Kinerja Algoritma Kriptografi Kandidat Advanced Encryption Standard (AES) pada Smartphone." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 4, no. 2 (March 18, 2018): 199–208. http://dx.doi.org/10.35957/jatisi.v4i2.103.
Full textMinier, Marine. "Improving impossible-differential attacks against Rijndael-160 and Rijndael-224." Designs, Codes and Cryptography 82, no. 1-2 (April 15, 2016): 117–29. http://dx.doi.org/10.1007/s10623-016-0206-7.
Full textWang, Qingju, Dawu Gu, Deniz Toz, Kerem Varici, and Zhiqiang Liu. "Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192." IET Information Security 9, no. 5 (September 1, 2015): 266–76. http://dx.doi.org/10.1049/iet-ifs.2014.0380.
Full textBakir, Bakir, and Hozairi Hozairi. "IMPLEMENTASI KRIPTOGRAFI PADA FILE ATTACHMENT EMAIL MENGGUNAKAN ALGORITMA RIJNDAEL." Jurnal Mnemonic 1, no. 2 (December 14, 2019): 75–81. http://dx.doi.org/10.36040/mnemonic.v1i2.42.
Full textAhmed, W. Eltayeb. "On Rijndael ByteSub Transformation." Applied Mathematics 10, no. 03 (2019): 113–18. http://dx.doi.org/10.4236/am.2019.103010.
Full textShiral, J. V., R. C. Deshmukh, J. S. Zade, and A. Potnurwar. "An Approach to Rijndael Algorithm." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 1 (January 31, 2015): 01–05. http://dx.doi.org/10.53555/nncse.v2i1.508.
Full textAde Chandra Saputra and Agus Sehatman Saragih. "RANCANG BANGUN WEBSITE BADAN PENGAWAS PEMILIHAN UMUM (BAWASLU) KALIMANTAN TENGAH." Jurnal Teknologi Informasi Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 13, no. 1 (October 30, 2019): 9–17. http://dx.doi.org/10.47111/jti.v13i1.279.
Full textZhang, Xin He, and Guan Nan Liu. "Study on AES and its Efficient Implementation on STM32F103 Processor." Applied Mechanics and Materials 397-400 (September 2013): 1828–32. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.1828.
Full textAzhar, Raesul, and Kurniawan. "Aplikasi Keamanan Sms Menggunakan Algoritma Rijndael." Jurnal Matrik 16, no. 1 (July 26, 2017): 105. http://dx.doi.org/10.30812/matrik.v16i1.15.
Full textLiu, Zhi Qiang, and De Han. "Dynamic Encryption Algorithm Based on Rijndael." Advanced Materials Research 490-495 (March 2012): 339–42. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.339.
Full textMuda, Z., R. Mahmod, and M. R. Sulong. "Key Transformation Approach for Rijndael Security." Information Technology Journal 9, no. 2 (February 1, 2010): 290–97. http://dx.doi.org/10.3923/itj.2010.290.297.
Full textMankar, Manisha. "Encryption and Decryption Using Rijndael Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 4 (2015): 2326–29. http://dx.doi.org/10.17762/ijritcc2321-8169.1504119.
Full textBhaskara, I. Made Adi, Dewa Made Wiharta, and Oka Saputra. "Perancangan Sistem Penyedia File Sharing dengan Enkripsi URL menggunakan Algoritma Rijndael." Majalah Ilmiah Teknologi Elektro 19, no. 2 (December 7, 2020): 171. http://dx.doi.org/10.24843/mite.2020.v19i02.p08.
Full textD.Parmar, Nilima, and Poonam Kadam. "Pipelined Implementation of Dynamic Rijndael S-Box." International Journal of Computer Applications 111, no. 10 (February 18, 2015): 36–38. http://dx.doi.org/10.5120/19578-1384.
Full textNagaraj, Srinivasan, Kishore Bhamidipati, and G. Apparao. "An Approach to Security Using Rijndael Algorithm." International Journal of Computer Applications 8, no. 5 (October 10, 2010): 31–35. http://dx.doi.org/10.5120/1204-1726.
Full textMukhopadhyay, Debdeep, and Dipanwita RoyChowdhury. "Fault based attack of the Rijndael cryptosystem." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 2 (April 2007): 267–90. http://dx.doi.org/10.1080/09720529.2007.10698120.
Full textJing-mei, Liu, Wei Bao-dian, Cheng Xiang-guo, and Wang Xin-mei. "Cryptanalysis of Rijndael S-box and improvement." Applied Mathematics and Computation 170, no. 2 (November 2005): 958–75. http://dx.doi.org/10.1016/j.amc.2004.12.043.
Full textWei, Baodian, Dongsu Liu, and Xinmei Wang. "Activity attack on reduced variants of Rijndael." Journal of Electronics (China) 21, no. 4 (July 2004): 314–21. http://dx.doi.org/10.1007/bf02687887.
Full textSparr, Rüdiger, and Ralph Wernsdorf. "Group theoretic properties of Rijndael-like ciphers." Discrete Applied Mathematics 156, no. 16 (September 2008): 3139–49. http://dx.doi.org/10.1016/j.dam.2007.12.011.
Full textGinting, Andi Gunanta. "The Effect Of Transport Protocol Performance On Encrypted Traffic Through Ad Hoc Networks." Jurnal Mekintek : Jurnal Mekanikal, Energi, Industri, Dan Teknologi 12, no. 1 (April 30, 2021): 1–8. http://dx.doi.org/10.35335/mekintek.v12i1.16.
Full textROSENTHAL, JOACHIM. "A POLYNOMIAL DESCRIPTION OF THE RIJNDAEL ADVANCED ENCRYPTION STANDARD." Journal of Algebra and Its Applications 02, no. 02 (June 2003): 223–36. http://dx.doi.org/10.1142/s0219498803000532.
Full textRuzhentsev, Victor, and Victor Dolgov. "Towards Provable Security of Rijndael-Like Spn Ciphers Against Differential Attacks." Tatra Mountains Mathematical Publications 53, no. 1 (December 1, 2012): 189–99. http://dx.doi.org/10.2478/v10127-012-0046-4.
Full textWaramballi, Mr Shreenath, Sunil B N, Mr Vijay C P, and Manjunath Raikar. "Two way Authentication with Bluetooth and Rijndael Algorithm." IJIREEICE 5, no. 7 (July 15, 2017): 10–13. http://dx.doi.org/10.17148/ijireeice.2017.5702.
Full textMinier, Marine, Raphael C. W. Phan, and Benjamin Pousse. "On Integral Distinguishers of Rijndael Family of Ciphers." Cryptologia 36, no. 2 (April 2012): 104–18. http://dx.doi.org/10.1080/01611194.2012.635110.
Full textHmood, Dalal Naeem. "A Random Key Generation Approach for Rijndael Algorithm." Journal of Al-Nahrain University Science 15, no. 3 (September 1, 2012): 190–95. http://dx.doi.org/10.22401/jnus.15.3.26.
Full textJun, Tang, and Wang Liejun. "An Improved Rijndael Encryption Algorithm Based on NiosII." Information Technology Journal 12, no. 7 (March 15, 2013): 1434–38. http://dx.doi.org/10.3923/itj.2013.1434.1438.
Full textOlivo, Angel Grediaga, Francisco Javier Brotons Molinero, Bernardo Ledesma Latorre, and Federico Garcia Crespi. "Analysis and Implementation Hardware-Software of Rijndael Encryption." IEEE Latin America Transactions 8, no. 1 (March 2010): 82–87. http://dx.doi.org/10.1109/tla.2010.5453950.
Full textWijaya, Andy, and Lukman Hakim. "IMPLEMENTASI ALGORITMA RIJNDAEL DALAM KEAMANAN DATA FORMAT MULTIMEDIA." Jurnal Ilmiah Teknologi Infomasi Terapan 5, no. 1 (September 2, 2019): 32–37. http://dx.doi.org/10.33197/jitter.vol5.iss1.2018.250.
Full textIm, Sung-Yeal, and Ki-Dong Chung. "ATM Cell Encipherment Method using Rijndael Algorithm in Physical Layer." KIPS Transactions:PartC 13C, no. 1 (February 1, 2006): 83–94. http://dx.doi.org/10.3745/kipstc.2006.13c.1.083.
Full textKristianto, Benny Djoede, Gat Gat, and Gusti Syarifudin. "PERANCANGAN PERANGKAT LUNAK ENKRIPSI SMS MENGGUNAKAN ALGORITMA RC6 DAN RIJNDAEL PADA SMARTPHONE." SISFOTENIKA 10, no. 1 (April 14, 2020): 115. http://dx.doi.org/10.30700/jst.v10i1.948.
Full textCui, Jie, Hong Zhong, Jiankai Wang, and Runhua Shi. "Generation and Optimization of Rijndael S-box Equation System." Information Technology Journal 13, no. 15 (July 15, 2014): 2482–88. http://dx.doi.org/10.3923/itj.2014.2482.2488.
Full textSklaos, N., and O. Koufopavlou. "Architectures and VLSI implementations of the AES-Proposal Rijndael." IEEE Transactions on Computers 51, no. 12 (December 2002): 1454–59. http://dx.doi.org/10.1109/tc.2002.1146712.
Full textSinha, Shristi, and Chaman Arya. "Algebraic Construction and Cryptographic Properties of Rijndael Substitution Box." Defence Science Journal 62, no. 1 (January 23, 2012): 32–37. http://dx.doi.org/10.14429/dsj.62.1439.
Full textVitaletti, Andrea, and Gianni Palombizio. "Rijndael for Sensor Networks: Is Speed the Main Issue?" Electronic Notes in Theoretical Computer Science 171, no. 1 (April 2007): 71–81. http://dx.doi.org/10.1016/j.entcs.2006.11.010.
Full textRiadi, Imam, Sunardi Sunardi, and Dwi Aryanto. "Algoritma End of File dan Rijndael pada Steganografi Video." JRST (Jurnal Riset Sains dan Teknologi) 5, no. 1 (March 30, 2021): 17. http://dx.doi.org/10.30595/jrst.v5i1.9187.
Full textQi, Chang Xing, Lei Zhao, and Qiao Ling Dong. "Design and Implementation of Safety Lock Based on Face Recognition." Applied Mechanics and Materials 596 (July 2014): 346–49. http://dx.doi.org/10.4028/www.scientific.net/amm.596.346.
Full textSrivastava, Pooja, Seema Verma, Abhilasha Agarwal, Pooja Pooja, and Shradh Gupta. "A Review Paper on Comparative Study of FPGA Implemented AES, Rijndael AES and Pipelined AES Algorithms for Secure Adhoc Networks." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 9, no. 3 (April 30, 2014): 1712–17. http://dx.doi.org/10.24297/ijmit.v9i3.658.
Full textSaputra, Ade Chandra, and Agus Sehatman Saragih. "IMPLEMENTASI ALGORITMA RIJNDAEL DALAM ENKRIPSI DAN DEKRIPSI GAMBAR DIGITAL BERBASIS WEB." Jurnal Teknologi Informasi Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 14, no. 1 (January 28, 2020): 52–63. http://dx.doi.org/10.47111/jti.v14i1.609.
Full textPeñate, Adrián Alfonso, and Pablo Freyre Arrozarena. "How secure is the Advanced Encryption Standard with random ShiftRows against Fault Analysis." Journal of Science and Technology on Information security 7, no. 1 (April 9, 2020): 14–21. http://dx.doi.org/10.54654/isj.v7i1.51.
Full textWang, Cuiping. "Computer parallel Rijndael algorithm optimization based on data stream decomposition." Journal of Computational Methods in Sciences and Engineering 19 (August 14, 2019): 307–12. http://dx.doi.org/10.3233/jcm-191044.
Full textIsmail, I., Ehab Elsehely, and Ahmed Abdalla. "Selective Video Encryption System using AES (Rijndael) Algorithm Using FPGA." International Conference on Electrical Engineering 9, no. 9th (May 1, 2014): 1–6. http://dx.doi.org/10.21608/iceeng.2014.30362.
Full textH.S., Mohan, A. Raji Reddy, and Manjunath T.N. "Improving the Diffusion power of AES Rijndael with key multiplication." International Journal of Computer Applications 30, no. 5 (September 29, 2011): 39–41. http://dx.doi.org/10.5120/3635-5076.
Full textKumarVerma, Harsh, and Ravindra Kumar Singh. "Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms." International Journal of Computer Applications 42, no. 16 (March 31, 2012): 1–7. http://dx.doi.org/10.5120/5773-6002.
Full textFreyre, Pablo, Oristela Cuellar, Nelson Díaz, and Adrián Alfonso. "Block Ciphers with Matrices Operating Alternately over Columns and Rows." Journal of Science and Technology on Information security 2, no. 12 (July 14, 2021): 18–29. http://dx.doi.org/10.54654/isj.v2i12.84.
Full textRuzhentsev, Victor. "The conditions of provable security of block ciphers against truncated differential attack." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (June 2015): 176–84. http://dx.doi.org/10.1556/012.2015.52.2.1307.
Full textRiadi, Imam, Sunardi Sunardi, and Dwi Aryanto. "Steganografi Video Digital dengan Algoritma LSB (Least Significant Bit) dan Rijndael." Journal of Innovation Information Technology and Application (JINITA) 2, no. 02 (December 31, 2020): 127–34. http://dx.doi.org/10.35970/jinita.v2i02.361.
Full textWang, Xing, Qiang Zhang, and Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing." Applied Mechanics and Materials 20-23 (January 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.
Full textTalwar, Y., C. E. Veni Madhavan, and Navin Rajpal. "On Partial Linearization of Byte Substitution Transformation of Rijndael-The AES." Journal of Computer Science 2, no. 1 (January 1, 2006): 48–52. http://dx.doi.org/10.3844/jcssp.2006.48.52.
Full text