Citation to this article as recorded by
Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and H.O. Alanazi, 2010. Suitability of using symmetric key to secure multimedia data: An overview. J. Applied Sci., 10: 1656-1661. CrossRefDirect Link |
Al-Alak S., Z. Zukranian, A. Abdullah and S. Subramiam, 2012. Authentication time of IEEE 802.15.4 with multiple-key protocol using distributed message authentication code algorithm. Res. J. Inform. Technol., 4: 140-154. CrossRefDirect Link |
Al-Alak, S., Z. Zukarnain, A. Abdullah and S. Subramiam, 2013. Randomness improvement of AES using MKP. Res. J. Inf. Technol., 5: 24-34. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367. CrossRefDirect Link |
Janakiraman, S., K.V.S.K. Kumar, R.R.K. Reddy, A. Srinivasulu, R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Humming bird with coloured wings: A feedback security approach. Inform. Technol. J., 13: 2022-2026. CrossRefDirect Link |
Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72. CrossRefDirect Link |
Rabah, K., 2006. Elliptic curve cryptography over binary finite field GF (2m). Inform. Technol. J., 5: 204-229. CrossRefDirect Link |
Rabah, K., 2006. Implementing secure RSA cryptosystems using your own cryptographic JCE provider. J. Applied Sci., 6: 482-510. CrossRefDirect Link |
Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167. CrossRefDirect Link |
Citation to this article as recorded by
A novel crypto technique based ciphertext shifting Egyptian Informatics Journal |
Mitigating Neighborship Attack in Underwater Sensor Networks 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) |
Dynamic vs Static Encryption Tables in DES Key Schedules 2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC) |
Elliptic Curve Cryptography over Binary Finite Field GF(2m) Information Technology Journal Vol. 5, Issue 1, 204, 2006 |
Implementing Secure RSA Cryptosystems Using Your Own Cryptographic JCE Provider Journal of Applied Sciences Vol. 6, Issue 3, 482, 2006 |
Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview Journal of Applied Sciences Vol. 10, Issue 15, 1656, 2010 |
An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael Journal of Applied Sciences Vol. 10, Issue 18, 2161, 2010 |
Firmware for Data Security: A Review Research Journal of Information Technology Vol. 4, Issue 3, 61, 2012 |
How to cite this article
Kefa Rabah , 2005. Theory and Implementation of Data Encryption Standard: A Review. Information Technology Journal, 4: 307-325.
DOI: 10.3923/itj.2005.307.325
URL: https://scialert.net/abstract/?doi=itj.2005.307.325
DOI: 10.3923/itj.2005.307.325
URL: https://scialert.net/abstract/?doi=itj.2005.307.325