XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Magazine:
Obfuscation of the standard XOR Encryption algorithm

Obfuscation of the standard XOR Encryption algorithm

By ,

Full text also available in the ACM Digital Library as PDF | HTML | Digital Edition

Tags: Algorithms, Computational complexity and cryptography, Computer crime, Cryptography, Data encryption, Design, Number-theoretic computations, Security, Security and privacy

Thank you for your interest in this article. This content is protected. You may log in with your ACM account or subscribe to access the full text.