Sulong, M. R. (2008). Key Transformation Approach for Rijndael Security.
Chicago Style (17th ed.) CitationSulong, Mek Rahmah. Key Transformation Approach for Rijndael Security. 2008.
MLA (8th ed.) CitationSulong, Mek Rahmah. Key Transformation Approach for Rijndael Security. 2008.
Warning: These citations may not always be 100% accurate.