![Figure 2 from Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel | Semantic Scholar Figure 2 from Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/da6c8b9a0aba014f56454994af710a708f61dc5e/3-Figure2-1.png)
Figure 2 from Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel | Semantic Scholar
![PDF] Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel | Semantic Scholar PDF] Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/da6c8b9a0aba014f56454994af710a708f61dc5e/3-Table2-1.png)
PDF] Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel | Semantic Scholar
![PDF] Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel | Semantic Scholar PDF] Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/da6c8b9a0aba014f56454994af710a708f61dc5e/3-Table1-1.png)