Contents: 1.Evaluation Criteria For AES 2.The AES Cipher 3.The AES Cipher 4.Substitute Bytes Transformation 5.Substitute Bytes Transformation 6.ShiftRows Transformation 7.AddRoundKey Transformation 8.AES key expansion algorithm 9.Equivalent Inverse Cipher
No comments:
Post a Comment