Research Article

Citations for "Theory and Implementation of Data Encryption Standard: A Review"


Citation to this article as recorded by ASCI logo


Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and H.O. Alanazi, 2010. Suitability of using symmetric key to secure multimedia data: An overview. J. Applied Sci., 10: 1656-1661.
CrossRef  |  Direct Link  |  

Al-Alak S., Z. Zukranian, A. Abdullah and S. Subramiam, 2012. Authentication time of IEEE 802.15.4 with multiple-key protocol using distributed message authentication code algorithm. Res. J. Inform. Technol., 4: 140-154.
CrossRef  |  Direct Link  |  

Al-Alak, S., Z. Zukarnain, A. Abdullah and S. Subramiam, 2013. Randomness improvement of AES using MKP. Res. J. Inf. Technol., 5: 24-34.
CrossRef  |  Direct Link  |  

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367.
CrossRef  |  Direct Link  |  

Janakiraman, S., K.V.S.K. Kumar, R.R.K. Reddy, A. Srinivasulu, R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Humming bird with coloured wings: A feedback security approach. Inform. Technol. J., 13: 2022-2026.
CrossRef  |  Direct Link  |  

Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
CrossRef  |  Direct Link  |  

Rabah, K., 2006. Elliptic curve cryptography over binary finite field GF (2m). Inform. Technol. J., 5: 204-229.
CrossRef  |  Direct Link  |  

Rabah, K., 2006. Implementing secure RSA cryptosystems using your own cryptographic JCE provider. J. Applied Sci., 6: 482-510.
CrossRef  |  Direct Link  |  

Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167.
CrossRef  |  Direct Link  |  


Citation to this article as recorded by Crossref logo


A novel crypto technique based ciphertext shifting
Egyptian Informatics Journal

Mitigating Neighborship Attack in Underwater Sensor Networks
2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)

Dynamic vs Static Encryption Tables in DES Key Schedules
2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)

Elliptic Curve Cryptography over Binary Finite Field GF(2m)
Information Technology Journal Vol. 5, Issue 1, 204, 2006

Implementing Secure RSA Cryptosystems Using Your Own Cryptographic JCE Provider
Journal of Applied Sciences Vol. 6, Issue 3, 482, 2006

Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview
Journal of Applied Sciences Vol. 10, Issue 15, 1656, 2010

An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael
Journal of Applied Sciences Vol. 10, Issue 18, 2161, 2010

Firmware for Data Security: A Review
Research Journal of Information Technology Vol. 4, Issue 3, 61, 2012

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2022 Science Alert. All Rights Reserved