Blowfish

From MaRDI portal
Software:38818



swMATH27100MaRDI QIDQ38818


No author found.





Related Items (22)

Design of image cipher using Latin squaresTiming Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsKey-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DESChaotic map-embedded Blowfish algorithm for security enhancement of colour image encryptionAnalysis of bitsum attack on block ciphersExploring confusion in product ciphers through regression analysisKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesSlender-set differential cryptanalysisA single-key attack on the full GOST block cipherUnnamed ItemFast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processorOptimizing a fast stream cipher for VLIW, SIMD, and superscalar processorsHigher Order Differential Attack of a CAST CipherJoint Hardware / Software Design of a Fast Stream CipherDifferential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of PermutationsCryptanalysis of PRESENT-Like Ciphers with Secret S-BoxesA Single-Key Attack on the Full GOST Block CipherО разностных свойствах симметричного криптоалгоритма, основанного на псевдодинамических подстановкахMultiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding techniqueA symmetric cryptographic scheme for data integrity verification in cloud databasesReflection Cryptanalysis of Some CiphersExplicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes


This page was built for software: Blowfish