AES Security Improvement by Utilizing New Key-Dependent XOR Tables | IEEE Journals & Magazine | IEEE Xplore