On the weak keys of blowfish
From MaRDI portal
Publication:4593779
DOI10.1007/3-540-60865-6_39zbMath1373.94932OpenAlexW1495580669WikidataQ21898105 ScholiaQ21898105MaRDI QIDQ4593779
Publication date: 15 November 2017
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-60865-6_39
Related Items
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach, Slender-set differential cryptanalysis, Differential cryptanalysis of PRESENT-like cipher, Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations, Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes