AES Security Improvement by Utilizing New Key-Dependent XOR Tables.
Tran Thi LuongNguyen Ngoc CuongBay VoPublished in: IEEE Access (2024)
Keyphrases
- private key
- high security
- block cipher
- data encryption standard
- encryption algorithms
- cryptographic algorithms
- statistical databases
- advanced encryption standard
- databases
- network security
- access control
- security systems
- encryption algorithm
- security problems
- database
- security issues
- public key
- security policies
- intrusion detection
- security requirements
- security analysis
- authentication protocol
- s box
- anomaly detection
- significant improvement