1 J. Y Oh, "Experimental analysis of the AES encryption algorithm" 3 (3): 2010
2 M. N. Islam, "Effect of security increment to symmetric data encryption through AES methodology" 291-294, 2008
3 E. Biham, "Differential cryptanalysis of DES-like cryptosystem" 4 (4): 1991
4 B. Y. Choi, "Design of AES Rijndael cryptographic processor" 26 (26): 1491-1500, 2001
5 S. M. Kim, "Cryptographic Algorithms Understand by Story" Road Book 197-224, 2017
6 M. S Hwang, "An elgamal-like cryptosystem for enciphering large messages" 14 (14): 445-446, 2002
1 J. Y Oh, "Experimental analysis of the AES encryption algorithm" 3 (3): 2010
2 M. N. Islam, "Effect of security increment to symmetric data encryption through AES methodology" 291-294, 2008
3 E. Biham, "Differential cryptanalysis of DES-like cryptosystem" 4 (4): 1991
4 B. Y. Choi, "Design of AES Rijndael cryptographic processor" 26 (26): 1491-1500, 2001
5 S. M. Kim, "Cryptographic Algorithms Understand by Story" Road Book 197-224, 2017
6 M. S Hwang, "An elgamal-like cryptosystem for enciphering large messages" 14 (14): 445-446, 2002