Citation to this article as recorded by
Al-Alak, S., Z. Zukarnain, A. Abdullah and S. Subramiam, 2013. Randomness improvement of AES using MKP. Res. J. Inf. Technol., 5: 24-34. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367. CrossRefDirect Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2015. Light weight steganography on RISC platform-implementation and analysis. Asian J. Scient. Res., 8: 278-290. CrossRefDirect Link |
Janakiraman, S., K.V.S.K. Kumar, R.R.K. Reddy, A. Srinivasulu, R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Humming bird with coloured wings: A feedback security approach. Inform. Technol. J., 13: 2022-2026. CrossRefDirect Link |
Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72. CrossRefDirect Link |
Tang, J. and L. Wang, 2013. An improved rijndael encryption algorithm based on niosii. Inf. Technol. J., 12: 1434-1438. CrossRefDirect Link |
Citation to this article as recorded by
Firmware for Data Security: A Review Research Journal of Information Technology Vol. 4, Issue 3, 61, 2012 |
How to cite this article
Z. Muda, R. Mahmod and M.R. Sulong, 2010. Key Transformation Approach for Rijndael Security. Information Technology Journal, 9: 290-297.
DOI: 10.3923/itj.2010.290.297
URL: https://scialert.net/abstract/?doi=itj.2010.290.297
DOI: 10.3923/itj.2010.290.297
URL: https://scialert.net/abstract/?doi=itj.2010.290.297