Login / Signup
On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers.
Tran Thi Luong
Linh Hoang Dinh
Published in:
Int. J. Inf. Comput. Secur. (2024)
Keyphrases
</>
block cipher
s box
secret key
lightweight
hash functions
databases
database
security protocols
application layer
access control
information security