References
[1] Rose, H. and Hag, J. (2012) Using a Cipher Key to Generate Dynamic S-Box in AES Cipher System. International Journal of Computer Science and Security, 6, 19-28.
[2] Sekar, A., Radhika, S. and Anand, K. (2012) Secure Communication Using 512 Bit Key. European Journal of Scientific Research, 52, 61-65.
[3] Kinga, R., Aline, A. and Christian, E. (2012) Generation and Testing of Random Numbers for Cryptographic Application. Proceeding of Romanian Academy, 13, 368-377.
[4] Daemen, J. and Rijmen, V. (2002) The Design of Rijndael: AES—The Advanced Encryption Standard of Information Security and Cryptography. Vol. 22, Springer Verlag, Berlin, 231-240.
[5] Warren, D. and Smith, W. (2014) AES Seems Weak, Linear Time Secure Cryptography. International Association for Cryptologic Research, 1-24.
[6] Stallings, W. (2012) Cryptography and Network Security Principles and Practice. 5th Edition, Prentice Hall, Upper Saddle River, 330-337.
[7] Alex, B. and Johann, G. (2012) Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware, Journal Fundamental Informatics—Cryptology in Progress. 10th Central European Conference on Cryptology, 10-12 June 2010, Vol. 114, 221-237.
[8] Matthew, G. (2013) Statistical Tests of Randomness on QKD through a Free-Space Channel Coupled to Daylight Noise. Journal of Light Wave Technology, 3, 34-35.
[9] Hadi, S., Alireza, S., Behnam, B. and Mohammadraze, A. (2013) Cryptanalysis of 7-Round AES-128. International Journal of Computer Application, 10, 21-29.
[10] Biryukov, A. and Nikolic, I. (2010) Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES. In: Gilbert, H., Ed., Advances in Cryptology EUROCRYPT 2010, Lecture Notes in Computer Science, Vol. 6610, Springer, Berlin, 322-344.
[11] Geiselmann, W., Januszewski, F., Kopfer, H., Pelzl, J. and Steinhardt, R. (2007) A Simpler Sieving Device: Combining ECM and TWIRL. In: Rhee, M.S. and Lee, B., Eds., Information Security and Cryptology—ICISC 2006, Lecture Notes in Computer Science, Springer, Berlin, 118-135.
http://dx.doi.org/10.1007/11927587_12
[12] Sumalatha, M. and Malal, M. (2013) Design of High Speed 128 Bits AES Algorithm for Data Encryption. International Journal of Current Engineering and Technology (IJCET), 20, 338-343.
[13] Kazys, A. and Janus, K. (2012) Key-Dependent S-Box Generation in AES Block Cipher System. Informatica, 20, 23-34.
[14] Shaaban, S., Wisam, E. and Shadi, A. (2013) Enhancement the Security of AES against Modern Attacks by Using Variable Key Block Cipher. International Arab Journal of E-Technology, 3, 17-26.
[15] Bernstein, D., Chen, H., Chen, M., Cheng, C., Hsiao, C. and Lange, T. (2009) The Billion-Mulmod-Per-Second PC. In SHARCS ’09: Special-Purpose Hardware for Attacking Cryptographic Systems, Lausanne, 131-144.
[16] Neetu, S. (2010) Cryptanalysis of Modern Cryptographic Algorithms. International Journal of Computer Science and Telecommunications, 1, 166-169.
[17] Julia, J., Ramlan, M., Salasiah, S. and Jazrin, R. (2012) Enhancing AES S-Box Generation Based on a Round Key. International Journal of Cyber-Security and Digital Forensics, 1, 65-72.
[18] Amit, C. and Damodar, T. (2012) Analysis of AES Algorithm Using Symmetric Cryptography. International Journal of Computing, Communications and Networking, 1, 57-62.
[19] Cukier, M., Berthier, R., Panjabi, S. and Tan, S. (2006) A Statistical Analysis of Attack Data to Separate Attacks. Proceedings of the International Conference on Dependable Systems and Networks (DSN 2006), Philadelphia, 25-28 June 2006, 123-142.
[20] Payal, P. and Soni, D. (2013) An Invention of Quantum Cryptography over the Classical Cryptography for Enhancing Security. International Journal of Applied or Innovation in Engineering and Management, 2, 243-246.
[21] Omer, J., Safia, A., El-Sayed, M. and Abdel-Badeeh, S. (2014) Statistical Analysis for Random Bits Generation on Quantum Key Distribution. Proceedings of the 3rd IEEE International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, Beirut, 29 April-1 May 2014, 45-51.
[22] Christain, K. and Mario, P. (2010) Applied Quantum Cryptography (Lecture Notes in Physics, Book 797). Springer, Berlin.
[23] Solange, G. and Mohammed, A. (2014) Applying QKD to Reach Unconditional Security in Communications. European Research Project SECOQC.
www.secoqc.net
[24] Ammar, O., Khaled, E., Muneer, A. and Eman, A. (2013) Quantum Key Distribution by Using RSA. Proceeding of the 3rd International Conference on Innovative Computing Technology (INTECH), London, 29-31 August 2013, 35-44.