Blowfish
From MaRDI portal
Cited in
(28)- Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes
- Reflection Cryptanalysis of Some Ciphers
- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor
- A symmetric cryptographic scheme for data integrity verification in cloud databases
- Exploring confusion in product ciphers through regression analysis
- Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
- A single-key attack on the full GOST block cipher
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Fish
- Twofish
- LSIC
- Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors
- Joint hardware/software design of a fast stream cipher
- RSAREF
- Tiger
- CryptDB
- Analysis of bitsum attack on block ciphers
- scientific article; zbMATH DE number 1498335 (Why is no real title available?)
- Slender-set differential cryptanalysis
- Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption
- Higher Order Differential Attack of a CAST Cipher
- A single-key attack on the full GOST block cipher
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Design of image cipher using Latin squares
- On differential properties of a symmetric cryptoalgorithm based on pseudo-dynamic substitutions
- Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique
This page was built for software: Blowfish