Figures & data
Table 1. View of the elements generated by
Table 2. S-box substitution table
Table 3. Plaintext files used in testing the encryption algorithm
Table 4. Linear and differential cryptanalysis results
Register now or learn more
Open access
People also read lists articles that other readers of this article have read.
Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.
Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.