Although the attack on cryptosystem is still not severe, the development of the scheme is stillongoing especially for the design of S-Box. Two main approach has beenused, which areheuristic method and algebraic method. Algebraic method as in current AES implementationhas been proven to be the most secure S-Box design to date. This review paper willconcentrate on two kinds of method of constructing AES S-Box, which are algebraic approachand heuristic approach. The objective is to review a method of constructing S-Box, which arecomparable or close to the original construction of AES S-Box especially for the heuristicapproach. Finally, all the listed S-Boxes from these two methods will be compared in terms oftheir security performance which is...
In this paper, a new AES-like design for key-dependent AES using S-box rotation is proposed. We also...
Rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long sec...
Rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long sec...
Substitution boxes are essential nonlinear modules that are popular in block cipher algorithms. The...
Substitution boxes are essential nonlinear modules that are popular in block cipher algorithms. They...
Cryptography methods are widely use in digital communication for secure data transaction. Cryptograp...
© 2020, Springer Nature Switzerland AG. The Advanced Encryption Standard (AES) is the most widely us...
The algebraic expression of the Advanced Encryption Standard (AES) RIJNDAEL S-box involved only 9 te...
Using AES-like S-boxes (generated using finite field inversion) provides an excellent starting point...
The internet has become a part of everyday life and is used as a communication tool, a way to bank, ...
The internet is widely used to support services ranging from education, medicine, entertainment to e...
In our previous paper, we modified the Advance Encryption System (AES) algorithm by proposing to use...
Substitution table or S-Box is the major core of AES algorithm and it is used to provide confusion c...
The Advanced Encryption Standard (AES) is the most popular algorithm used in symmetric key cryptogra...
The development of block ciphers has resulted in a number of cryptographic algorithms such as AES, a...
In this paper, a new AES-like design for key-dependent AES using S-box rotation is proposed. We also...
Rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long sec...
Rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long sec...
Substitution boxes are essential nonlinear modules that are popular in block cipher algorithms. The...
Substitution boxes are essential nonlinear modules that are popular in block cipher algorithms. They...
Cryptography methods are widely use in digital communication for secure data transaction. Cryptograp...
© 2020, Springer Nature Switzerland AG. The Advanced Encryption Standard (AES) is the most widely us...
The algebraic expression of the Advanced Encryption Standard (AES) RIJNDAEL S-box involved only 9 te...
Using AES-like S-boxes (generated using finite field inversion) provides an excellent starting point...
The internet has become a part of everyday life and is used as a communication tool, a way to bank, ...
The internet is widely used to support services ranging from education, medicine, entertainment to e...
In our previous paper, we modified the Advance Encryption System (AES) algorithm by proposing to use...
Substitution table or S-Box is the major core of AES algorithm and it is used to provide confusion c...
The Advanced Encryption Standard (AES) is the most popular algorithm used in symmetric key cryptogra...
The development of block ciphers has resulted in a number of cryptographic algorithms such as AES, a...
In this paper, a new AES-like design for key-dependent AES using S-box rotation is proposed. We also...
Rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long sec...
Rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long sec...