PDF Fulltext XML References Citation
How to cite this article
Z. Muda, R. Mahmod and M.R. Sulong, 2010. Key Transformation Approach for Rijndael Security. Information Technology Journal, 9: 290-297.
DOI: 10.3923/itj.2010.290.297
URL: https://scialert.net/abstract/?doi=itj.2010.290.297
DOI: 10.3923/itj.2010.290.297
URL: https://scialert.net/abstract/?doi=itj.2010.290.297