Modified Blowfish Algorithm
暂无分享,去创建一个
[1] Vaibhav Poonia,et al. Analysis of modified Blowfish algorithm in different cases with various parameters , 2015, 2015 International Conference on Advanced Computing and Communication Systems.
[2] S. Fong-In,et al. A partial encryption scheme using absolute-value chaotic map for secure electronic health records , 2014, The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE).
[3] Pariza Kamboj,et al. Security Enhancement of Blowfish Block Cipher , 2016 .
[4] Ashwak Alabaichi. A Dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm , 2015 .
[5] Mansoor Ebrahim,et al. Symmetric Algorithm Survey: A Comparative Analysis , 2013, ArXiv.
[6] Vijay Kumar,et al. A Survey on Various Cryptography Techniques , 2014 .
[7] Serge Vaudenay,et al. On the Weak Keys of Blowfish , 1996, FSE.
[8] Rahul Hans,et al. A Review and Comparative Analysis of Various Encryption Algorithms , 2015 .
[9] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[10] Jorge E. Camargo,et al. Study of Cryptographic Algorithms to Protect Electronic Medical Records in Mobile Platforms , 2015 .
[11] Tayseer S. Atia. DEVELOPMENT OF A NEW ALGORITHM FOR KEY AND S-BOX GENERATION IN BLOWFISH ALGORITHM , 2014 .
[12] Nimisha Patel,et al. Integrated ECC and Blowfish for Smartphone Security , 2016 .
[13] Manish Ranjan,et al. A Cloud Based Secure Voting System using Homomorphic Encryption for Android Platform , 2016 .
[14] Gurjeevan Singh,et al. Superiority of Blowfish Algorithm in Wireless Networks , 2012 .
[15] A. Suruliandi,et al. Performance analysis of encryption algorithms for Information Security , 2013, 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT).
[16] Ashim Saha,et al. An improved data security using DNA sequencing , 2013, MobileHealth '13.
[17] T. Vino,et al. Genome based highly secured image using DNA cryptography and trellis algorithm , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[18] Ashish Kumar Kaundal,et al. DNA Based Cryptography : A Review , 2006 .
[19] Mahua Bhattacharya,et al. Generation of novel encrypted code using cryptography for multiple level data security for Electronic Patient Record , 2015, 2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM).
[20] Jeyamala Chandrasekaran,et al. ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION , 2011 .
[21] A. Rama Krishna,et al. A Hybrid Cryptographic System for Secured Device to Device Communication , 2016 .
[22] Faudziah Ahmad,et al. Randomness analysis on blowfish block cipher using ECB and CBC modes , 2013 .
[23] B. Ross. Performance Enhancement of Blowfish Encryption Using RK-Blowfish Technique , 2017 .
[24] Joseph Raj,et al. ENHANCEMENT OF BLOWFISH ENCRYPTION IN TERMS OF SECURITY USING MIXED STRATEGY TECHNIQUE , 2016 .
[25] K. Vasanth,et al. BLOWFISH ENCRYPTION ALGORITHM FOR INFORMATION SECURITY , 2015 .
[26] L Christina,et al. Optimized Blowfish Encryption Technique , 2014 .
[27] H. S. Sheshadri,et al. A Naïve Visual Cryptographic Algorithm for the Transfer of a Compressed Medical Images , 2015, Int. J. Recent Contributions Eng. Sci. IT.
[28] Mohammed M. Fouad,et al. Speech encryption applying a modified Blowfish algorithm , 2014, 2014 International Conference on Engineering and Technology (ICET).
[29] Asaduzzaman,et al. Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6 , 2016, 2016 International Conference on Networking Systems and Security (NSysS).