2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE) 2018
DOI: 10.1109/iccceee.2018.8515761
|View full text |Cite
|
Sign up to set email alerts
|

Key-dependent Advanced Encryption Standard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…For decryption, the inverse matrix is used in the multiplication as depicted in figure 5. It is worth mentioning that the multiplication process is carried under Galois Field 2 8 . Obviously, this procedure has a strong diffusion effect because, for every column, all its bytes will contribute unequally to determine the new value of the bytes of that column.…”
Section: Aes Shiftrows Stage Vs P-aes Modifiedshiftrows Stagementioning
confidence: 99%
See 1 more Smart Citation
“…For decryption, the inverse matrix is used in the multiplication as depicted in figure 5. It is worth mentioning that the multiplication process is carried under Galois Field 2 8 . Obviously, this procedure has a strong diffusion effect because, for every column, all its bytes will contribute unequally to determine the new value of the bytes of that column.…”
Section: Aes Shiftrows Stage Vs P-aes Modifiedshiftrows Stagementioning
confidence: 99%
“…A high level description for the P-AES is provided in [8]. However, the contribution of this research paper includes the following:…”
Section: Introductionmentioning
confidence: 99%