Sulong, M. R. (2008). Key Transformation Approach for Rijndael Security.
Chicago Style (17th ed.) CitationSulong, Mek Rahmah. Key Transformation Approach for Rijndael Security. 2008.
MLA引文Sulong, Mek Rahmah. Key Transformation Approach for Rijndael Security. 2008.
警告:这些引文格式不一定是100%准确.