Blowfish
From MaRDI portal
Software:38818
swMATH27100MaRDI QIDQ38818FDOQ38818
Author name not available (Why is that?)
Cited In (22)
- A Single-Key Attack on the Full GOST Block Cipher
- Slender-set differential cryptanalysis
- Higher Order Differential Attack of a CAST Cipher
- Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Title not available (Why is that?)
- Joint Hardware / Software Design of a Fast Stream Cipher
- Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
- Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors
- Exploring confusion in product ciphers through regression analysis
- Analysis of bitsum attack on block ciphers
- Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption
- Design of image cipher using Latin squares
- Reflection Cryptanalysis of Some Ciphers
- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- A symmetric cryptographic scheme for data integrity verification in cloud databases
- Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
- О разностных свойствах симметричного криптоалгоритма, основанного на псевдодинамических подстановках
- A single-key attack on the full GOST block cipher
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes
This page was built for software: Blowfish