2017 International Conference on Inventive Systems and Control (ICISC) 2017
DOI: 10.1109/icisc.2017.8068652
|View full text |Cite
|
Sign up to set email alerts
|

An efficient algorithm for key generation in advance encryption standard using sudoku solving method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…The advantage of AES over other encryption technologies is that it supports the encryption of large amounts of data and requires less execution time. The 16 bytes are organized in four by four matrix [8]. It designed to prevent all known attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The advantage of AES over other encryption technologies is that it supports the encryption of large amounts of data and requires less execution time. The 16 bytes are organized in four by four matrix [8]. It designed to prevent all known attacks.…”
Section: Introductionmentioning
confidence: 99%