Blowfish
From MaRDI portal
Software:38818
No author found.
Related Items (22)
Design of image cipher using Latin squares ⋮ Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems ⋮ Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES ⋮ Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption ⋮ Analysis of bitsum attack on block ciphers ⋮ Exploring confusion in product ciphers through regression analysis ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Slender-set differential cryptanalysis ⋮ A single-key attack on the full GOST block cipher ⋮ Unnamed Item ⋮ Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor ⋮ Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors ⋮ Higher Order Differential Attack of a CAST Cipher ⋮ Joint Hardware / Software Design of a Fast Stream Cipher ⋮ Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations ⋮ Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes ⋮ A Single-Key Attack on the Full GOST Block Cipher ⋮ О разностных свойствах симметричного криптоалгоритма, основанного на псевдодинамических подстановках ⋮ Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique ⋮ A symmetric cryptographic scheme for data integrity verification in cloud databases ⋮ Reflection Cryptanalysis of Some Ciphers ⋮ Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes
This page was built for software: Blowfish