Login / Signup

On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers.

Tran Thi LuongLinh Hoang Dinh
Published in: Int. J. Inf. Comput. Secur. (2024)
Keyphrases
  • block cipher
  • s box
  • secret key
  • lightweight
  • hash functions
  • databases
  • database
  • security protocols
  • application layer
  • access control
  • information security