On the Weak Keys of Blowfish
暂无分享,去创建一个
[1] C. Adams. A formal and practical design procedure for substitution-permutation network cryptosystems , 1992 .
[2] H. Feistel. Cryptography and Computer Privacy , 1973 .
[3] Howard M. Heys,et al. Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis , 1997, Des. Codes Cryptogr..
[4] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[5] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.