On the weak keys of blowfish
From MaRDI portal
Publication:4593779
Recommendations
- A New Class of Weak Keys for Blowfish
- On the bit security of the weak Diffie-Hellman problem
- WEAK KEYS AND WEAK DATA FOILING THE TWO NEMESES
- On the bit security of the Diffie-Hellman key
- Revisiting Wiener’s Attack – New Weak Keys in RSA
- Weakness in a RSA-based password authenticated key exchange protocol
- Weak keys for AEZ, and the external key padding attack
- Weaknesses in some threshold cryptosystems
- New weak keys in RSA
Cited in
(10)- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Slender-set differential cryptanalysis
- A New Class of Weak Keys for Blowfish
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
- Ubiquitous weak-key classes of BRW-polynomial function
- How many weak-keys exist in T-310?
- Differential cryptanalysis of PRESENT-like cipher
- All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach
- WEAK KEYS AND WEAK DATA FOILING THE TWO NEMESES
This page was built for publication: On the weak keys of blowfish
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4593779)