@incollection{, 16882AD3B43A2E3E8920AE9E9906C910 , author={{Dr. Mohamed Abd ElhamidIbrahim} and {}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1563345 } @incollection{b0, , title={{Understanding brute force}} , author={{ DanielJBernstein }} , booktitle={{Workshop Record of ECRYPT STVL Workshop on Symmetric Key Encryption, eSTREAM report}} , year={2005} 36 } @incollection{b1, , title={{Investigations in Brute Force Attack on Cellular Security Based on Des and Aes}} , author={{ NeerajKumar }} , journal={{IJCEM International Journal of Computational Engineering & Management}} 14 , year={2011} } @incollection{b2, , title={{Distinguisher and Related-Key Attack on the Full AES-256}} , author={{ AlexBiryukov } and { DmitryKhovratovich } and { IvicaNikolic }} , booktitle={{Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology Conference}} Santa Barbara, CA, USA , publisher={Springer} , year={August 16-20, 2009. 2009} 5677 } @incollection{b3, , title={{In How Many Ways Can You Write Rijndael}} , author={{ EBarkan } and { EBiham }} , booktitle={{Advances in Cryptology -ASIACRYPT 2002: 8th International Conference on Theory and Application of Cryptology and Information Security}} , editor={ YZheng } , publisher={Springer-Verlag} , year={2002} 2501 } @incollection{b4, , title={{Making AES stronger: AES with key dependent S-box}} , author={{ GNKrishnamurthy } and { VRamaswamy }} , journal={{IJCSNS International Journal of Computer Science and Network Security}} 8 9 , year={2008} } @incollection{b5, , title={{New impossible differential attacks on AES}} , author={{ JiqiangLu } and { OrrDunkelman } and { NathanKeller } and { JongsungKim }} , booktitle={{Progress in Cryptology-INDOCRYPT 2008}} Berlin Heidelberg , publisher={Springer} , year={2008} } @book{b6, , title={{A CLASSICAL INTRODUCTION TO MODERN CRYPTOGRAPHY}} , author={{ SergeVaudenay }} , year={2006} , publisher={Springer Science+Business Media, Inc} } @incollection{b7, , title={{A CONFIGURABLE SECURED IMAGE ENCRYPTION TECHNIQUE USING 3D ARRAY BLOCK ROTATION}} , author={{ GLokeshwari } and { .SDr } and { GKumar } and { Aparna }} , journal={{International Journal of Engineering Science and Technology (IJEST)}} 4 01 , year={January 2012} } @incollection{b8, , title={{On the Nonlinearity of Exponential Welch Costas Functions}} , author={{ KonstantinosDrakakis } and { VerónicaRequena } and { GaryMcguire }} , journal={{IEEE TRANSACTIONS ON INFORMATION THEORY}} 56 3 , year={2010} } @incollection{b9, , title={{Performance Analysis of AES and MARS Encryption Algorithms}} , author={{ HSMohan } and { Reddy }} , journal={{IJCSI International Journal of Computer Science Issues}} 8 1 , year={July 2011} }