Skip to main content
. 2020 Oct 29;20(21):6158. doi: 10.3390/s20216158

Figure 20.

Figure 20

Cipher text generated via encryption of plain text, followed by XORing with InV using a special text that produces the same blocks.