Rijndael is a substitution-permutation network (SPN) block cipher for the AES development process. Its block and key sizes range from 128 to 256 bits in steps of 32 bits, which can be denoted by Rijndael-$b$-$k$, where $b$ and $k$ are the block and key sizes, respectively. Among them, Rijndael-128-128/192/256, that is, AES, has been studied by many researchers, and the security of other large-block versions of Rijndael has been exploited less frequently. However, more attention has been paid to large-block versions of block ciphers with the fast development of quantum computers. In this paper, we propose improved impossible differential attacks on 10-round Rijndael-256-256, 10-round Rijndael-224-256, and 9-round Rijndael-224-224 using precomputation tables, redundancies of key schedules, and multiple impossible differentials. For 10-round Rijndael-256-256, the data, time, and memory complexities of our attack were approximately $2^{244.4}$ chosen plaintexts, $2^{240.1}$ encryptions, and $2^{181.4}$ blocks, respectively. For 10-round Rijndael-224-256, the data, time, and memory complexities of our attack were approximately $2^{214.4}$ chosen plaintexts, $2^{241.3}$ encryptions, and $2^{183.4}$ blocks, respectively. For 9-round Rijndael-224-224, the data, time, and memory complexities of our attack are approximately $2^{214.4}$ chosen plaintexts, $2^{113.4}$ encryptions, and $2^{87.4}$ blocks, respectively, or $2^{206.6}$ chosen plaintexts, $2^{153.6}$ encryptions, and $2^{111.6}$ blocks, respectively. To the best of our knowledge, our results are currently the best on Rijndael-256-256 and Rijndael-224-224/256.